diff --git a/.openapi-generator/FILES b/.openapi-generator/FILES
index f611d6f..5159a13 100644
--- a/.openapi-generator/FILES
+++ b/.openapi-generator/FILES
@@ -27,6 +27,11 @@ docs/AuthenticatorDuoStage.md
docs/AuthenticatorDuoStageDeviceImportResponse.md
docs/AuthenticatorDuoStageManualDeviceImportRequest.md
docs/AuthenticatorDuoStageRequest.md
+docs/AuthenticatorMobileChallenge.md
+docs/AuthenticatorMobileChallengeResponseRequest.md
+docs/AuthenticatorMobilePayloadChallenge.md
+docs/AuthenticatorMobileStage.md
+docs/AuthenticatorMobileStageRequest.md
docs/AuthenticatorSMSChallenge.md
docs/AuthenticatorSMSChallengeResponseRequest.md
docs/AuthenticatorSMSStage.md
@@ -161,6 +166,7 @@ docs/InvitationRequest.md
docs/InvitationStage.md
docs/InvitationStageRequest.md
docs/IssuerModeEnum.md
+docs/ItemMatchingModeEnum.md
docs/KubernetesServiceConnection.md
docs/KubernetesServiceConnectionRequest.md
docs/LDAPAPIAccessMode.md
@@ -183,6 +189,16 @@ docs/LoginMetrics.md
docs/LoginSource.md
docs/ManagedApi.md
docs/Metadata.md
+docs/MobileDevice.md
+docs/MobileDeviceCheckInRequest.md
+docs/MobileDeviceEnrollmentCallback.md
+docs/MobileDeviceEnrollmentRequest.md
+docs/MobileDeviceEnrollmentStatus.md
+docs/MobileDeviceEnrollmentStatusStatusEnum.md
+docs/MobileDeviceInfo.md
+docs/MobileDeviceInfoRequest.md
+docs/MobileDeviceRequest.md
+docs/MobileDeviceResponseRequest.md
docs/ModelEnum.md
docs/ModelRequest.md
docs/NameIdPolicyEnum.md
@@ -219,6 +235,7 @@ docs/PaginatedApplicationList.md
docs/PaginatedAuthenticateWebAuthnStageList.md
docs/PaginatedAuthenticatedSessionList.md
docs/PaginatedAuthenticatorDuoStageList.md
+docs/PaginatedAuthenticatorMobileStageList.md
docs/PaginatedAuthenticatorSMSStageList.md
docs/PaginatedAuthenticatorStaticStageList.md
docs/PaginatedAuthenticatorTOTPStageList.md
@@ -254,6 +271,7 @@ docs/PaginatedLDAPPropertyMappingList.md
docs/PaginatedLDAPProviderList.md
docs/PaginatedLDAPSourceList.md
docs/PaginatedLicenseList.md
+docs/PaginatedMobileDeviceList.md
docs/PaginatedNotificationList.md
docs/PaginatedNotificationRuleList.md
docs/PaginatedNotificationTransportList.md
@@ -294,6 +312,7 @@ docs/PaginatedServiceConnectionList.md
docs/PaginatedSourceList.md
docs/PaginatedStageList.md
docs/PaginatedStaticDeviceList.md
+docs/PaginatedSystemTaskList.md
docs/PaginatedTOTPDeviceList.md
docs/PaginatedTenantList.md
docs/PaginatedTokenList.md
@@ -321,6 +340,7 @@ docs/PasswordStageRequest.md
docs/PatchedApplicationRequest.md
docs/PatchedAuthenticateWebAuthnStageRequest.md
docs/PatchedAuthenticatorDuoStageRequest.md
+docs/PatchedAuthenticatorMobileStageRequest.md
docs/PatchedAuthenticatorSMSStageRequest.md
docs/PatchedAuthenticatorStaticStageRequest.md
docs/PatchedAuthenticatorTOTPStageRequest.md
@@ -352,6 +372,7 @@ docs/PatchedLDAPPropertyMappingRequest.md
docs/PatchedLDAPProviderRequest.md
docs/PatchedLDAPSourceRequest.md
docs/PatchedLicenseRequest.md
+docs/PatchedMobileDeviceRequest.md
docs/PatchedNotificationRequest.md
docs/PatchedNotificationRuleRequest.md
docs/PatchedNotificationTransportRequest.md
@@ -396,6 +417,7 @@ docs/PatchedUserWriteStageRequest.md
docs/PatchedWebAuthnDeviceRequest.md
docs/Permission.md
docs/PermissionAssignRequest.md
+docs/PlatformEnum.md
docs/PlexAuthenticationChallenge.md
docs/PlexAuthenticationChallengeResponseRequest.md
docs/PlexSource.md
@@ -495,10 +517,10 @@ docs/StaticDeviceTokenRequest.md
docs/SubModeEnum.md
docs/SystemInfo.md
docs/SystemInfoRuntime.md
+docs/SystemTask.md
+docs/SystemTaskStatusEnum.md
docs/TOTPDevice.md
docs/TOTPDeviceRequest.md
-docs/Task.md
-docs/TaskStatusEnum.md
docs/Tenant.md
docs/TenantAdminGroupRequestRequest.md
docs/TenantRecoveryKeyRequestRequest.md
@@ -626,6 +648,11 @@ src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStage.kt
src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStageDeviceImportResponse.kt
src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStageManualDeviceImportRequest.kt
src/main/kotlin/io/goauthentik/api/models/AuthenticatorDuoStageRequest.kt
+src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallenge.kt
+src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileChallengeResponseRequest.kt
+src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobilePayloadChallenge.kt
+src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStage.kt
+src/main/kotlin/io/goauthentik/api/models/AuthenticatorMobileStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/AuthenticatorSMSChallenge.kt
src/main/kotlin/io/goauthentik/api/models/AuthenticatorSMSChallengeResponseRequest.kt
src/main/kotlin/io/goauthentik/api/models/AuthenticatorSMSStage.kt
@@ -754,6 +781,7 @@ src/main/kotlin/io/goauthentik/api/models/InvitationRequest.kt
src/main/kotlin/io/goauthentik/api/models/InvitationStage.kt
src/main/kotlin/io/goauthentik/api/models/InvitationStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/IssuerModeEnum.kt
+src/main/kotlin/io/goauthentik/api/models/ItemMatchingModeEnum.kt
src/main/kotlin/io/goauthentik/api/models/KubernetesServiceConnection.kt
src/main/kotlin/io/goauthentik/api/models/KubernetesServiceConnectionRequest.kt
src/main/kotlin/io/goauthentik/api/models/LDAPAPIAccessMode.kt
@@ -775,6 +803,16 @@ src/main/kotlin/io/goauthentik/api/models/LoginChallengeTypes.kt
src/main/kotlin/io/goauthentik/api/models/LoginMetrics.kt
src/main/kotlin/io/goauthentik/api/models/LoginSource.kt
src/main/kotlin/io/goauthentik/api/models/Metadata.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDevice.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceCheckInRequest.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentCallback.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentRequest.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatus.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceEnrollmentStatusStatusEnum.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfo.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceInfoRequest.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceRequest.kt
+src/main/kotlin/io/goauthentik/api/models/MobileDeviceResponseRequest.kt
src/main/kotlin/io/goauthentik/api/models/ModelEnum.kt
src/main/kotlin/io/goauthentik/api/models/ModelRequest.kt
src/main/kotlin/io/goauthentik/api/models/NameIdPolicyEnum.kt
@@ -809,6 +847,7 @@ src/main/kotlin/io/goauthentik/api/models/PaginatedApplicationList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticateWebAuthnStageList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatedSessionList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorDuoStageList.kt
+src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorMobileStageList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorSMSStageList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorStaticStageList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedAuthenticatorTOTPStageList.kt
@@ -844,6 +883,7 @@ src/main/kotlin/io/goauthentik/api/models/PaginatedLDAPPropertyMappingList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedLDAPProviderList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedLDAPSourceList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedLicenseList.kt
+src/main/kotlin/io/goauthentik/api/models/PaginatedMobileDeviceList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedNotificationList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedNotificationRuleList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedNotificationTransportList.kt
@@ -884,6 +924,7 @@ src/main/kotlin/io/goauthentik/api/models/PaginatedServiceConnectionList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedSourceList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedStageList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedStaticDeviceList.kt
+src/main/kotlin/io/goauthentik/api/models/PaginatedSystemTaskList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedTOTPDeviceList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedTenantList.kt
src/main/kotlin/io/goauthentik/api/models/PaginatedTokenList.kt
@@ -911,6 +952,7 @@ src/main/kotlin/io/goauthentik/api/models/PasswordStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedApplicationRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticateWebAuthnStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorDuoStageRequest.kt
+src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorMobileStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorSMSStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorStaticStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedAuthenticatorTOTPStageRequest.kt
@@ -942,6 +984,7 @@ src/main/kotlin/io/goauthentik/api/models/PatchedLDAPPropertyMappingRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedLDAPProviderRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedLDAPSourceRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedLicenseRequest.kt
+src/main/kotlin/io/goauthentik/api/models/PatchedMobileDeviceRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedNotificationRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedNotificationRuleRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedNotificationTransportRequest.kt
@@ -986,6 +1029,7 @@ src/main/kotlin/io/goauthentik/api/models/PatchedUserWriteStageRequest.kt
src/main/kotlin/io/goauthentik/api/models/PatchedWebAuthnDeviceRequest.kt
src/main/kotlin/io/goauthentik/api/models/Permission.kt
src/main/kotlin/io/goauthentik/api/models/PermissionAssignRequest.kt
+src/main/kotlin/io/goauthentik/api/models/PlatformEnum.kt
src/main/kotlin/io/goauthentik/api/models/PlexAuthenticationChallenge.kt
src/main/kotlin/io/goauthentik/api/models/PlexAuthenticationChallengeResponseRequest.kt
src/main/kotlin/io/goauthentik/api/models/PlexSource.kt
@@ -1076,10 +1120,10 @@ src/main/kotlin/io/goauthentik/api/models/StaticDeviceTokenRequest.kt
src/main/kotlin/io/goauthentik/api/models/SubModeEnum.kt
src/main/kotlin/io/goauthentik/api/models/SystemInfo.kt
src/main/kotlin/io/goauthentik/api/models/SystemInfoRuntime.kt
+src/main/kotlin/io/goauthentik/api/models/SystemTask.kt
+src/main/kotlin/io/goauthentik/api/models/SystemTaskStatusEnum.kt
src/main/kotlin/io/goauthentik/api/models/TOTPDevice.kt
src/main/kotlin/io/goauthentik/api/models/TOTPDeviceRequest.kt
-src/main/kotlin/io/goauthentik/api/models/Task.kt
-src/main/kotlin/io/goauthentik/api/models/TaskStatusEnum.kt
src/main/kotlin/io/goauthentik/api/models/Tenant.kt
src/main/kotlin/io/goauthentik/api/models/TenantAdminGroupRequestRequest.kt
src/main/kotlin/io/goauthentik/api/models/TenantRecoveryKeyRequestRequest.kt
diff --git a/README.md b/README.md
index eff891a..705541b 100644
--- a/README.md
+++ b/README.md
@@ -14,7 +14,7 @@ This repo contains a generated API client to talk with authentik's API from Kotl
## Overview
This API client was generated by the [OpenAPI Generator](https://openapi-generator.tech) project. By using the [OpenAPI-spec](https://www.openapis.org/) from a remote server, you can easily generate an API client.
-- API version: 2023.10.6
+- API version: 2023.10.7
- Package version:
## Documentation for API Endpoints
@@ -31,9 +31,6 @@ Class | Method | HTTP request | Description
*AdminApi* | [**adminSettingsUpdate**](docs/AdminApi.md#adminsettingsupdate) | **PUT** /admin/settings/ |
*AdminApi* | [**adminSystemCreate**](docs/AdminApi.md#adminsystemcreate) | **POST** /admin/system/ |
*AdminApi* | [**adminSystemRetrieve**](docs/AdminApi.md#adminsystemretrieve) | **GET** /admin/system/ |
-*AdminApi* | [**adminSystemTasksList**](docs/AdminApi.md#adminsystemtaskslist) | **GET** /admin/system_tasks/ |
-*AdminApi* | [**adminSystemTasksRetrieve**](docs/AdminApi.md#adminsystemtasksretrieve) | **GET** /admin/system_tasks/{id}/ |
-*AdminApi* | [**adminSystemTasksRetryCreate**](docs/AdminApi.md#adminsystemtasksretrycreate) | **POST** /admin/system_tasks/{id}/retry/ |
*AdminApi* | [**adminVersionRetrieve**](docs/AdminApi.md#adminversionretrieve) | **GET** /admin/version/ |
*AdminApi* | [**adminWorkersRetrieve**](docs/AdminApi.md#adminworkersretrieve) | **GET** /admin/workers/ |
*AuthenticatorsApi* | [**authenticatorsAdminAllList**](docs/AuthenticatorsApi.md#authenticatorsadminalllist) | **GET** /authenticators/admin/all/ |
@@ -43,6 +40,12 @@ Class | Method | HTTP request | Description
*AuthenticatorsApi* | [**authenticatorsAdminDuoPartialUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminduopartialupdate) | **PATCH** /authenticators/admin/duo/{id}/ |
*AuthenticatorsApi* | [**authenticatorsAdminDuoRetrieve**](docs/AuthenticatorsApi.md#authenticatorsadminduoretrieve) | **GET** /authenticators/admin/duo/{id}/ |
*AuthenticatorsApi* | [**authenticatorsAdminDuoUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminduoupdate) | **PUT** /authenticators/admin/duo/{id}/ |
+*AuthenticatorsApi* | [**authenticatorsAdminMobileCreate**](docs/AuthenticatorsApi.md#authenticatorsadminmobilecreate) | **POST** /authenticators/admin/mobile/ |
+*AuthenticatorsApi* | [**authenticatorsAdminMobileDestroy**](docs/AuthenticatorsApi.md#authenticatorsadminmobiledestroy) | **DELETE** /authenticators/admin/mobile/{uuid}/ |
+*AuthenticatorsApi* | [**authenticatorsAdminMobileList**](docs/AuthenticatorsApi.md#authenticatorsadminmobilelist) | **GET** /authenticators/admin/mobile/ |
+*AuthenticatorsApi* | [**authenticatorsAdminMobilePartialUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminmobilepartialupdate) | **PATCH** /authenticators/admin/mobile/{uuid}/ |
+*AuthenticatorsApi* | [**authenticatorsAdminMobileRetrieve**](docs/AuthenticatorsApi.md#authenticatorsadminmobileretrieve) | **GET** /authenticators/admin/mobile/{uuid}/ |
+*AuthenticatorsApi* | [**authenticatorsAdminMobileUpdate**](docs/AuthenticatorsApi.md#authenticatorsadminmobileupdate) | **PUT** /authenticators/admin/mobile/{uuid}/ |
*AuthenticatorsApi* | [**authenticatorsAdminSmsCreate**](docs/AuthenticatorsApi.md#authenticatorsadminsmscreate) | **POST** /authenticators/admin/sms/ |
*AuthenticatorsApi* | [**authenticatorsAdminSmsDestroy**](docs/AuthenticatorsApi.md#authenticatorsadminsmsdestroy) | **DELETE** /authenticators/admin/sms/{id}/ |
*AuthenticatorsApi* | [**authenticatorsAdminSmsList**](docs/AuthenticatorsApi.md#authenticatorsadminsmslist) | **GET** /authenticators/admin/sms/ |
@@ -74,6 +77,16 @@ Class | Method | HTTP request | Description
*AuthenticatorsApi* | [**authenticatorsDuoRetrieve**](docs/AuthenticatorsApi.md#authenticatorsduoretrieve) | **GET** /authenticators/duo/{id}/ |
*AuthenticatorsApi* | [**authenticatorsDuoUpdate**](docs/AuthenticatorsApi.md#authenticatorsduoupdate) | **PUT** /authenticators/duo/{id}/ |
*AuthenticatorsApi* | [**authenticatorsDuoUsedByList**](docs/AuthenticatorsApi.md#authenticatorsduousedbylist) | **GET** /authenticators/duo/{id}/used_by/ |
+*AuthenticatorsApi* | [**authenticatorsMobileCheckInCreate**](docs/AuthenticatorsApi.md#authenticatorsmobilecheckincreate) | **POST** /authenticators/mobile/{uuid}/check_in/ |
+*AuthenticatorsApi* | [**authenticatorsMobileDestroy**](docs/AuthenticatorsApi.md#authenticatorsmobiledestroy) | **DELETE** /authenticators/mobile/{uuid}/ |
+*AuthenticatorsApi* | [**authenticatorsMobileEnrollmentCallbackCreate**](docs/AuthenticatorsApi.md#authenticatorsmobileenrollmentcallbackcreate) | **POST** /authenticators/mobile/{uuid}/enrollment_callback/ |
+*AuthenticatorsApi* | [**authenticatorsMobileEnrollmentStatusCreate**](docs/AuthenticatorsApi.md#authenticatorsmobileenrollmentstatuscreate) | **POST** /authenticators/mobile/{uuid}/enrollment_status/ |
+*AuthenticatorsApi* | [**authenticatorsMobileList**](docs/AuthenticatorsApi.md#authenticatorsmobilelist) | **GET** /authenticators/mobile/ |
+*AuthenticatorsApi* | [**authenticatorsMobilePartialUpdate**](docs/AuthenticatorsApi.md#authenticatorsmobilepartialupdate) | **PATCH** /authenticators/mobile/{uuid}/ |
+*AuthenticatorsApi* | [**authenticatorsMobileReceiveResponseCreate**](docs/AuthenticatorsApi.md#authenticatorsmobilereceiveresponsecreate) | **POST** /authenticators/mobile/{uuid}/receive_response/ |
+*AuthenticatorsApi* | [**authenticatorsMobileRetrieve**](docs/AuthenticatorsApi.md#authenticatorsmobileretrieve) | **GET** /authenticators/mobile/{uuid}/ |
+*AuthenticatorsApi* | [**authenticatorsMobileUpdate**](docs/AuthenticatorsApi.md#authenticatorsmobileupdate) | **PUT** /authenticators/mobile/{uuid}/ |
+*AuthenticatorsApi* | [**authenticatorsMobileUsedByList**](docs/AuthenticatorsApi.md#authenticatorsmobileusedbylist) | **GET** /authenticators/mobile/{uuid}/used_by/ |
*AuthenticatorsApi* | [**authenticatorsSmsDestroy**](docs/AuthenticatorsApi.md#authenticatorssmsdestroy) | **DELETE** /authenticators/sms/{id}/ |
*AuthenticatorsApi* | [**authenticatorsSmsList**](docs/AuthenticatorsApi.md#authenticatorssmslist) | **GET** /authenticators/sms/ |
*AuthenticatorsApi* | [**authenticatorsSmsPartialUpdate**](docs/AuthenticatorsApi.md#authenticatorssmspartialupdate) | **PATCH** /authenticators/sms/{id}/ |
@@ -204,6 +217,9 @@ Class | Method | HTTP request | Description
*EventsApi* | [**eventsRulesRetrieve**](docs/EventsApi.md#eventsrulesretrieve) | **GET** /events/rules/{pbm_uuid}/ |
*EventsApi* | [**eventsRulesUpdate**](docs/EventsApi.md#eventsrulesupdate) | **PUT** /events/rules/{pbm_uuid}/ |
*EventsApi* | [**eventsRulesUsedByList**](docs/EventsApi.md#eventsrulesusedbylist) | **GET** /events/rules/{pbm_uuid}/used_by/ |
+*EventsApi* | [**eventsSystemTasksList**](docs/EventsApi.md#eventssystemtaskslist) | **GET** /events/system_tasks/ |
+*EventsApi* | [**eventsSystemTasksRetrieve**](docs/EventsApi.md#eventssystemtasksretrieve) | **GET** /events/system_tasks/{uuid}/ |
+*EventsApi* | [**eventsSystemTasksRunCreate**](docs/EventsApi.md#eventssystemtasksruncreate) | **POST** /events/system_tasks/{uuid}/run/ |
*EventsApi* | [**eventsTransportsCreate**](docs/EventsApi.md#eventstransportscreate) | **POST** /events/transports/ |
*EventsApi* | [**eventsTransportsDestroy**](docs/EventsApi.md#eventstransportsdestroy) | **DELETE** /events/transports/{uuid}/ |
*EventsApi* | [**eventsTransportsList**](docs/EventsApi.md#eventstransportslist) | **GET** /events/transports/ |
@@ -573,6 +589,13 @@ Class | Method | HTTP request | Description
*StagesApi* | [**stagesAuthenticatorDuoRetrieve**](docs/StagesApi.md#stagesauthenticatorduoretrieve) | **GET** /stages/authenticator/duo/{stage_uuid}/ |
*StagesApi* | [**stagesAuthenticatorDuoUpdate**](docs/StagesApi.md#stagesauthenticatorduoupdate) | **PUT** /stages/authenticator/duo/{stage_uuid}/ |
*StagesApi* | [**stagesAuthenticatorDuoUsedByList**](docs/StagesApi.md#stagesauthenticatorduousedbylist) | **GET** /stages/authenticator/duo/{stage_uuid}/used_by/ |
+*StagesApi* | [**stagesAuthenticatorMobileCreate**](docs/StagesApi.md#stagesauthenticatormobilecreate) | **POST** /stages/authenticator/mobile/ |
+*StagesApi* | [**stagesAuthenticatorMobileDestroy**](docs/StagesApi.md#stagesauthenticatormobiledestroy) | **DELETE** /stages/authenticator/mobile/{stage_uuid}/ |
+*StagesApi* | [**stagesAuthenticatorMobileList**](docs/StagesApi.md#stagesauthenticatormobilelist) | **GET** /stages/authenticator/mobile/ |
+*StagesApi* | [**stagesAuthenticatorMobilePartialUpdate**](docs/StagesApi.md#stagesauthenticatormobilepartialupdate) | **PATCH** /stages/authenticator/mobile/{stage_uuid}/ |
+*StagesApi* | [**stagesAuthenticatorMobileRetrieve**](docs/StagesApi.md#stagesauthenticatormobileretrieve) | **GET** /stages/authenticator/mobile/{stage_uuid}/ |
+*StagesApi* | [**stagesAuthenticatorMobileUpdate**](docs/StagesApi.md#stagesauthenticatormobileupdate) | **PUT** /stages/authenticator/mobile/{stage_uuid}/ |
+*StagesApi* | [**stagesAuthenticatorMobileUsedByList**](docs/StagesApi.md#stagesauthenticatormobileusedbylist) | **GET** /stages/authenticator/mobile/{stage_uuid}/used_by/ |
*StagesApi* | [**stagesAuthenticatorSmsCreate**](docs/StagesApi.md#stagesauthenticatorsmscreate) | **POST** /stages/authenticator/sms/ |
*StagesApi* | [**stagesAuthenticatorSmsDestroy**](docs/StagesApi.md#stagesauthenticatorsmsdestroy) | **DELETE** /stages/authenticator/sms/{stage_uuid}/ |
*StagesApi* | [**stagesAuthenticatorSmsList**](docs/StagesApi.md#stagesauthenticatorsmslist) | **GET** /stages/authenticator/sms/ |
@@ -759,6 +782,11 @@ Class | Method | HTTP request | Description
- [AuthenticatorDuoStageDeviceImportResponse](docs/AuthenticatorDuoStageDeviceImportResponse.md)
- [AuthenticatorDuoStageManualDeviceImportRequest](docs/AuthenticatorDuoStageManualDeviceImportRequest.md)
- [AuthenticatorDuoStageRequest](docs/AuthenticatorDuoStageRequest.md)
+ - [AuthenticatorMobileChallenge](docs/AuthenticatorMobileChallenge.md)
+ - [AuthenticatorMobileChallengeResponseRequest](docs/AuthenticatorMobileChallengeResponseRequest.md)
+ - [AuthenticatorMobilePayloadChallenge](docs/AuthenticatorMobilePayloadChallenge.md)
+ - [AuthenticatorMobileStage](docs/AuthenticatorMobileStage.md)
+ - [AuthenticatorMobileStageRequest](docs/AuthenticatorMobileStageRequest.md)
- [AuthenticatorSMSChallenge](docs/AuthenticatorSMSChallenge.md)
- [AuthenticatorSMSChallengeResponseRequest](docs/AuthenticatorSMSChallengeResponseRequest.md)
- [AuthenticatorSMSStage](docs/AuthenticatorSMSStage.md)
@@ -887,6 +915,7 @@ Class | Method | HTTP request | Description
- [InvitationStage](docs/InvitationStage.md)
- [InvitationStageRequest](docs/InvitationStageRequest.md)
- [IssuerModeEnum](docs/IssuerModeEnum.md)
+ - [ItemMatchingModeEnum](docs/ItemMatchingModeEnum.md)
- [KubernetesServiceConnection](docs/KubernetesServiceConnection.md)
- [KubernetesServiceConnectionRequest](docs/KubernetesServiceConnectionRequest.md)
- [LDAPAPIAccessMode](docs/LDAPAPIAccessMode.md)
@@ -908,6 +937,16 @@ Class | Method | HTTP request | Description
- [LoginMetrics](docs/LoginMetrics.md)
- [LoginSource](docs/LoginSource.md)
- [Metadata](docs/Metadata.md)
+ - [MobileDevice](docs/MobileDevice.md)
+ - [MobileDeviceCheckInRequest](docs/MobileDeviceCheckInRequest.md)
+ - [MobileDeviceEnrollmentCallback](docs/MobileDeviceEnrollmentCallback.md)
+ - [MobileDeviceEnrollmentRequest](docs/MobileDeviceEnrollmentRequest.md)
+ - [MobileDeviceEnrollmentStatus](docs/MobileDeviceEnrollmentStatus.md)
+ - [MobileDeviceEnrollmentStatusStatusEnum](docs/MobileDeviceEnrollmentStatusStatusEnum.md)
+ - [MobileDeviceInfo](docs/MobileDeviceInfo.md)
+ - [MobileDeviceInfoRequest](docs/MobileDeviceInfoRequest.md)
+ - [MobileDeviceRequest](docs/MobileDeviceRequest.md)
+ - [MobileDeviceResponseRequest](docs/MobileDeviceResponseRequest.md)
- [ModelEnum](docs/ModelEnum.md)
- [ModelRequest](docs/ModelRequest.md)
- [NameIdPolicyEnum](docs/NameIdPolicyEnum.md)
@@ -942,6 +981,7 @@ Class | Method | HTTP request | Description
- [PaginatedAuthenticateWebAuthnStageList](docs/PaginatedAuthenticateWebAuthnStageList.md)
- [PaginatedAuthenticatedSessionList](docs/PaginatedAuthenticatedSessionList.md)
- [PaginatedAuthenticatorDuoStageList](docs/PaginatedAuthenticatorDuoStageList.md)
+ - [PaginatedAuthenticatorMobileStageList](docs/PaginatedAuthenticatorMobileStageList.md)
- [PaginatedAuthenticatorSMSStageList](docs/PaginatedAuthenticatorSMSStageList.md)
- [PaginatedAuthenticatorStaticStageList](docs/PaginatedAuthenticatorStaticStageList.md)
- [PaginatedAuthenticatorTOTPStageList](docs/PaginatedAuthenticatorTOTPStageList.md)
@@ -977,6 +1017,7 @@ Class | Method | HTTP request | Description
- [PaginatedLDAPProviderList](docs/PaginatedLDAPProviderList.md)
- [PaginatedLDAPSourceList](docs/PaginatedLDAPSourceList.md)
- [PaginatedLicenseList](docs/PaginatedLicenseList.md)
+ - [PaginatedMobileDeviceList](docs/PaginatedMobileDeviceList.md)
- [PaginatedNotificationList](docs/PaginatedNotificationList.md)
- [PaginatedNotificationRuleList](docs/PaginatedNotificationRuleList.md)
- [PaginatedNotificationTransportList](docs/PaginatedNotificationTransportList.md)
@@ -1017,6 +1058,7 @@ Class | Method | HTTP request | Description
- [PaginatedSourceList](docs/PaginatedSourceList.md)
- [PaginatedStageList](docs/PaginatedStageList.md)
- [PaginatedStaticDeviceList](docs/PaginatedStaticDeviceList.md)
+ - [PaginatedSystemTaskList](docs/PaginatedSystemTaskList.md)
- [PaginatedTOTPDeviceList](docs/PaginatedTOTPDeviceList.md)
- [PaginatedTenantList](docs/PaginatedTenantList.md)
- [PaginatedTokenList](docs/PaginatedTokenList.md)
@@ -1044,6 +1086,7 @@ Class | Method | HTTP request | Description
- [PatchedApplicationRequest](docs/PatchedApplicationRequest.md)
- [PatchedAuthenticateWebAuthnStageRequest](docs/PatchedAuthenticateWebAuthnStageRequest.md)
- [PatchedAuthenticatorDuoStageRequest](docs/PatchedAuthenticatorDuoStageRequest.md)
+ - [PatchedAuthenticatorMobileStageRequest](docs/PatchedAuthenticatorMobileStageRequest.md)
- [PatchedAuthenticatorSMSStageRequest](docs/PatchedAuthenticatorSMSStageRequest.md)
- [PatchedAuthenticatorStaticStageRequest](docs/PatchedAuthenticatorStaticStageRequest.md)
- [PatchedAuthenticatorTOTPStageRequest](docs/PatchedAuthenticatorTOTPStageRequest.md)
@@ -1075,6 +1118,7 @@ Class | Method | HTTP request | Description
- [PatchedLDAPProviderRequest](docs/PatchedLDAPProviderRequest.md)
- [PatchedLDAPSourceRequest](docs/PatchedLDAPSourceRequest.md)
- [PatchedLicenseRequest](docs/PatchedLicenseRequest.md)
+ - [PatchedMobileDeviceRequest](docs/PatchedMobileDeviceRequest.md)
- [PatchedNotificationRequest](docs/PatchedNotificationRequest.md)
- [PatchedNotificationRuleRequest](docs/PatchedNotificationRuleRequest.md)
- [PatchedNotificationTransportRequest](docs/PatchedNotificationTransportRequest.md)
@@ -1119,6 +1163,7 @@ Class | Method | HTTP request | Description
- [PatchedWebAuthnDeviceRequest](docs/PatchedWebAuthnDeviceRequest.md)
- [Permission](docs/Permission.md)
- [PermissionAssignRequest](docs/PermissionAssignRequest.md)
+ - [PlatformEnum](docs/PlatformEnum.md)
- [PlexAuthenticationChallenge](docs/PlexAuthenticationChallenge.md)
- [PlexAuthenticationChallengeResponseRequest](docs/PlexAuthenticationChallengeResponseRequest.md)
- [PlexSource](docs/PlexSource.md)
@@ -1209,10 +1254,10 @@ Class | Method | HTTP request | Description
- [SubModeEnum](docs/SubModeEnum.md)
- [SystemInfo](docs/SystemInfo.md)
- [SystemInfoRuntime](docs/SystemInfoRuntime.md)
+ - [SystemTask](docs/SystemTask.md)
+ - [SystemTaskStatusEnum](docs/SystemTaskStatusEnum.md)
- [TOTPDevice](docs/TOTPDevice.md)
- [TOTPDeviceRequest](docs/TOTPDeviceRequest.md)
- - [Task](docs/Task.md)
- - [TaskStatusEnum](docs/TaskStatusEnum.md)
- [Tenant](docs/Tenant.md)
- [TenantAdminGroupRequestRequest](docs/TenantAdminGroupRequestRequest.md)
- [TenantRecoveryKeyRequestRequest](docs/TenantRecoveryKeyRequestRequest.md)
@@ -1285,6 +1330,15 @@ Class | Method | HTTP request | Description
Note, each API key must be added to a map of `map[string]APIKey` where the key is: Authorization and passed in as the auth context for each request.
+### mobile_device_token
+
+- **Type**: API key
+- **API key parameter name**: Authorization
+- **Location**: HTTP header
+
+Note, each API key must be added to a map of `map[string]APIKey` where the key is: Authorization and passed in as the auth context for each request.
+
+
## Documentation for Utility Methods
Due to the fact that model structure members are all pointers, this package contains
diff --git a/build.gradle b/build.gradle
index fe709a9..2a48c5c 100644
--- a/build.gradle
+++ b/build.gradle
@@ -1,4 +1,5 @@
group 'io.goauthentik'
+version '1.0.0'
wrapper {
gradleVersion = '7.5'
diff --git a/docs/AdminApi.md b/docs/AdminApi.md
index c04b8ca..3910698 100644
--- a/docs/AdminApi.md
+++ b/docs/AdminApi.md
@@ -12,9 +12,6 @@ Method | HTTP request | Description
[**adminSettingsUpdate**](AdminApi.md#adminSettingsUpdate) | **PUT** /admin/settings/ |
[**adminSystemCreate**](AdminApi.md#adminSystemCreate) | **POST** /admin/system/ |
[**adminSystemRetrieve**](AdminApi.md#adminSystemRetrieve) | **GET** /admin/system/ |
-[**adminSystemTasksList**](AdminApi.md#adminSystemTasksList) | **GET** /admin/system_tasks/ |
-[**adminSystemTasksRetrieve**](AdminApi.md#adminSystemTasksRetrieve) | **GET** /admin/system_tasks/{id}/ |
-[**adminSystemTasksRetryCreate**](AdminApi.md#adminSystemTasksRetryCreate) | **POST** /admin/system_tasks/{id}/retry/ |
[**adminVersionRetrieve**](AdminApi.md#adminVersionRetrieve) | **GET** /admin/version/ |
[**adminWorkersRetrieve**](AdminApi.md#adminWorkersRetrieve) | **GET** /admin/workers/ |
@@ -386,151 +383,6 @@ This endpoint does not need any parameter.
### Authorization
-Configure authentik:
- ApiClient.apiKey["Authorization"] = ""
- ApiClient.apiKeyPrefix["Authorization"] = ""
-
-### HTTP request headers
-
- - **Content-Type**: Not defined
- - **Accept**: application/json
-
-
-# **adminSystemTasksList**
-> kotlin.collections.List<Task> adminSystemTasksList()
-
-
-
-List system tasks
-
-### Example
-```kotlin
-// Import classes:
-//import io.goauthentik.api.infrastructure.*
-//import io.goauthentik.api.models.*
-
-val apiInstance = AdminApi()
-try {
- val result : kotlin.collections.List = apiInstance.adminSystemTasksList()
- println(result)
-} catch (e: ClientException) {
- println("4xx response calling AdminApi#adminSystemTasksList")
- e.printStackTrace()
-} catch (e: ServerException) {
- println("5xx response calling AdminApi#adminSystemTasksList")
- e.printStackTrace()
-}
-```
-
-### Parameters
-This endpoint does not need any parameter.
-
-### Return type
-
-[**kotlin.collections.List<Task>**](Task.md)
-
-### Authorization
-
-
-Configure authentik:
- ApiClient.apiKey["Authorization"] = ""
- ApiClient.apiKeyPrefix["Authorization"] = ""
-
-### HTTP request headers
-
- - **Content-Type**: Not defined
- - **Accept**: application/json
-
-
-# **adminSystemTasksRetrieve**
-> Task adminSystemTasksRetrieve(id)
-
-
-
-Get a single system task
-
-### Example
-```kotlin
-// Import classes:
-//import io.goauthentik.api.infrastructure.*
-//import io.goauthentik.api.models.*
-
-val apiInstance = AdminApi()
-val id : kotlin.String = id_example // kotlin.String |
-try {
- val result : Task = apiInstance.adminSystemTasksRetrieve(id)
- println(result)
-} catch (e: ClientException) {
- println("4xx response calling AdminApi#adminSystemTasksRetrieve")
- e.printStackTrace()
-} catch (e: ServerException) {
- println("5xx response calling AdminApi#adminSystemTasksRetrieve")
- e.printStackTrace()
-}
-```
-
-### Parameters
-
-Name | Type | Description | Notes
-------------- | ------------- | ------------- | -------------
- **id** | **kotlin.String**| |
-
-### Return type
-
-[**Task**](Task.md)
-
-### Authorization
-
-
-Configure authentik:
- ApiClient.apiKey["Authorization"] = ""
- ApiClient.apiKeyPrefix["Authorization"] = ""
-
-### HTTP request headers
-
- - **Content-Type**: Not defined
- - **Accept**: application/json
-
-
-# **adminSystemTasksRetryCreate**
-> adminSystemTasksRetryCreate(id)
-
-
-
-Retry task
-
-### Example
-```kotlin
-// Import classes:
-//import io.goauthentik.api.infrastructure.*
-//import io.goauthentik.api.models.*
-
-val apiInstance = AdminApi()
-val id : kotlin.String = id_example // kotlin.String |
-try {
- apiInstance.adminSystemTasksRetryCreate(id)
-} catch (e: ClientException) {
- println("4xx response calling AdminApi#adminSystemTasksRetryCreate")
- e.printStackTrace()
-} catch (e: ServerException) {
- println("5xx response calling AdminApi#adminSystemTasksRetryCreate")
- e.printStackTrace()
-}
-```
-
-### Parameters
-
-Name | Type | Description | Notes
-------------- | ------------- | ------------- | -------------
- **id** | **kotlin.String**| |
-
-### Return type
-
-null (empty response body)
-
-### Authorization
-
-
Configure authentik:
ApiClient.apiKey["Authorization"] = ""
ApiClient.apiKeyPrefix["Authorization"] = ""
diff --git a/docs/AppEnum.md b/docs/AppEnum.md
index ed448ec..580d941 100644
--- a/docs/AppEnum.md
+++ b/docs/AppEnum.md
@@ -60,6 +60,8 @@
* `stagesPeriodAuthenticatorDuo` (value: `"authentik.stages.authenticator_duo"`)
+ * `stagesPeriodAuthenticatorMobile` (value: `"authentik.stages.authenticator_mobile"`)
+
* `stagesPeriodAuthenticatorSms` (value: `"authentik.stages.authenticator_sms"`)
* `stagesPeriodAuthenticatorStatic` (value: `"authentik.stages.authenticator_static"`)
diff --git a/docs/AuthenticatorMobileChallenge.md b/docs/AuthenticatorMobileChallenge.md
new file mode 100644
index 0000000..9933e2f
--- /dev/null
+++ b/docs/AuthenticatorMobileChallenge.md
@@ -0,0 +1,16 @@
+
+# AuthenticatorMobileChallenge
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**type** | [**ChallengeChoices**](ChallengeChoices.md) | |
+**pendingUser** | **kotlin.String** | |
+**pendingUserAvatar** | **kotlin.String** | |
+**payload** | [**AuthenticatorMobilePayloadChallenge**](AuthenticatorMobilePayloadChallenge.md) | |
+**flowInfo** | [**ContextualFlowInfo**](ContextualFlowInfo.md) | | [optional]
+**component** | **kotlin.String** | | [optional]
+**responseErrors** | **kotlin.collections.Map<kotlin.String, kotlin.collections.List<ErrorDetail>>** | | [optional]
+
+
+
diff --git a/docs/AuthenticatorMobileChallengeResponseRequest.md b/docs/AuthenticatorMobileChallengeResponseRequest.md
new file mode 100644
index 0000000..1d4b685
--- /dev/null
+++ b/docs/AuthenticatorMobileChallengeResponseRequest.md
@@ -0,0 +1,10 @@
+
+# AuthenticatorMobileChallengeResponseRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**component** | **kotlin.String** | | [optional]
+
+
+
diff --git a/docs/AuthenticatorMobilePayloadChallenge.md b/docs/AuthenticatorMobilePayloadChallenge.md
new file mode 100644
index 0000000..7b8490c
--- /dev/null
+++ b/docs/AuthenticatorMobilePayloadChallenge.md
@@ -0,0 +1,12 @@
+
+# AuthenticatorMobilePayloadChallenge
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**u** | **kotlin.String** | Server URL | [optional]
+**s** | **kotlin.String** | Stage UUID | [optional]
+**t** | **kotlin.String** | Initial Token | [optional]
+
+
+
diff --git a/docs/AuthenticatorMobileStage.md b/docs/AuthenticatorMobileStage.md
new file mode 100644
index 0000000..921d533
--- /dev/null
+++ b/docs/AuthenticatorMobileStage.md
@@ -0,0 +1,20 @@
+
+# AuthenticatorMobileStage
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**pk** | [**java.util.UUID**](java.util.UUID.md) | | [readonly]
+**name** | **kotlin.String** | |
+**component** | **kotlin.String** | Get object type so that we know how to edit the object | [readonly]
+**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
+**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
+**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
+**cgwEndpoint** | **kotlin.String** | |
+**flowSet** | [**kotlin.collections.List<FlowSet>**](FlowSet.md) | | [optional]
+**configureFlow** | [**java.util.UUID**](java.util.UUID.md) | Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. | [optional]
+**friendlyName** | **kotlin.String** | | [optional]
+**itemMatchingMode** | [**ItemMatchingModeEnum**](ItemMatchingModeEnum.md) | | [optional]
+
+
+
diff --git a/docs/AuthenticatorMobileStageRequest.md b/docs/AuthenticatorMobileStageRequest.md
new file mode 100644
index 0000000..45faf18
--- /dev/null
+++ b/docs/AuthenticatorMobileStageRequest.md
@@ -0,0 +1,15 @@
+
+# AuthenticatorMobileStageRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**name** | **kotlin.String** | |
+**cgwEndpoint** | **kotlin.String** | |
+**flowSet** | [**kotlin.collections.List<FlowSetRequest>**](FlowSetRequest.md) | | [optional]
+**configureFlow** | [**java.util.UUID**](java.util.UUID.md) | Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. | [optional]
+**friendlyName** | **kotlin.String** | | [optional]
+**itemMatchingMode** | [**ItemMatchingModeEnum**](ItemMatchingModeEnum.md) | | [optional]
+
+
+
diff --git a/docs/AuthenticatorValidationChallengeResponseRequest.md b/docs/AuthenticatorValidationChallengeResponseRequest.md
index baf071d..768b99c 100644
--- a/docs/AuthenticatorValidationChallengeResponseRequest.md
+++ b/docs/AuthenticatorValidationChallengeResponseRequest.md
@@ -10,6 +10,7 @@ Name | Type | Description | Notes
**code** | **kotlin.String** | | [optional]
**webauthn** | [**kotlin.collections.Map<kotlin.String, kotlin.Any>**](kotlin.Any.md) | | [optional]
**duo** | **kotlin.Int** | | [optional]
+**mobile** | **kotlin.String** | | [optional]
diff --git a/docs/AuthenticatorsApi.md b/docs/AuthenticatorsApi.md
index d9536ad..0386998 100644
--- a/docs/AuthenticatorsApi.md
+++ b/docs/AuthenticatorsApi.md
@@ -11,6 +11,12 @@ Method | HTTP request | Description
[**authenticatorsAdminDuoPartialUpdate**](AuthenticatorsApi.md#authenticatorsAdminDuoPartialUpdate) | **PATCH** /authenticators/admin/duo/{id}/ |
[**authenticatorsAdminDuoRetrieve**](AuthenticatorsApi.md#authenticatorsAdminDuoRetrieve) | **GET** /authenticators/admin/duo/{id}/ |
[**authenticatorsAdminDuoUpdate**](AuthenticatorsApi.md#authenticatorsAdminDuoUpdate) | **PUT** /authenticators/admin/duo/{id}/ |
+[**authenticatorsAdminMobileCreate**](AuthenticatorsApi.md#authenticatorsAdminMobileCreate) | **POST** /authenticators/admin/mobile/ |
+[**authenticatorsAdminMobileDestroy**](AuthenticatorsApi.md#authenticatorsAdminMobileDestroy) | **DELETE** /authenticators/admin/mobile/{uuid}/ |
+[**authenticatorsAdminMobileList**](AuthenticatorsApi.md#authenticatorsAdminMobileList) | **GET** /authenticators/admin/mobile/ |
+[**authenticatorsAdminMobilePartialUpdate**](AuthenticatorsApi.md#authenticatorsAdminMobilePartialUpdate) | **PATCH** /authenticators/admin/mobile/{uuid}/ |
+[**authenticatorsAdminMobileRetrieve**](AuthenticatorsApi.md#authenticatorsAdminMobileRetrieve) | **GET** /authenticators/admin/mobile/{uuid}/ |
+[**authenticatorsAdminMobileUpdate**](AuthenticatorsApi.md#authenticatorsAdminMobileUpdate) | **PUT** /authenticators/admin/mobile/{uuid}/ |
[**authenticatorsAdminSmsCreate**](AuthenticatorsApi.md#authenticatorsAdminSmsCreate) | **POST** /authenticators/admin/sms/ |
[**authenticatorsAdminSmsDestroy**](AuthenticatorsApi.md#authenticatorsAdminSmsDestroy) | **DELETE** /authenticators/admin/sms/{id}/ |
[**authenticatorsAdminSmsList**](AuthenticatorsApi.md#authenticatorsAdminSmsList) | **GET** /authenticators/admin/sms/ |
@@ -42,6 +48,16 @@ Method | HTTP request | Description
[**authenticatorsDuoRetrieve**](AuthenticatorsApi.md#authenticatorsDuoRetrieve) | **GET** /authenticators/duo/{id}/ |
[**authenticatorsDuoUpdate**](AuthenticatorsApi.md#authenticatorsDuoUpdate) | **PUT** /authenticators/duo/{id}/ |
[**authenticatorsDuoUsedByList**](AuthenticatorsApi.md#authenticatorsDuoUsedByList) | **GET** /authenticators/duo/{id}/used_by/ |
+[**authenticatorsMobileCheckInCreate**](AuthenticatorsApi.md#authenticatorsMobileCheckInCreate) | **POST** /authenticators/mobile/{uuid}/check_in/ |
+[**authenticatorsMobileDestroy**](AuthenticatorsApi.md#authenticatorsMobileDestroy) | **DELETE** /authenticators/mobile/{uuid}/ |
+[**authenticatorsMobileEnrollmentCallbackCreate**](AuthenticatorsApi.md#authenticatorsMobileEnrollmentCallbackCreate) | **POST** /authenticators/mobile/{uuid}/enrollment_callback/ |
+[**authenticatorsMobileEnrollmentStatusCreate**](AuthenticatorsApi.md#authenticatorsMobileEnrollmentStatusCreate) | **POST** /authenticators/mobile/{uuid}/enrollment_status/ |
+[**authenticatorsMobileList**](AuthenticatorsApi.md#authenticatorsMobileList) | **GET** /authenticators/mobile/ |
+[**authenticatorsMobilePartialUpdate**](AuthenticatorsApi.md#authenticatorsMobilePartialUpdate) | **PATCH** /authenticators/mobile/{uuid}/ |
+[**authenticatorsMobileReceiveResponseCreate**](AuthenticatorsApi.md#authenticatorsMobileReceiveResponseCreate) | **POST** /authenticators/mobile/{uuid}/receive_response/ |
+[**authenticatorsMobileRetrieve**](AuthenticatorsApi.md#authenticatorsMobileRetrieve) | **GET** /authenticators/mobile/{uuid}/ |
+[**authenticatorsMobileUpdate**](AuthenticatorsApi.md#authenticatorsMobileUpdate) | **PUT** /authenticators/mobile/{uuid}/ |
+[**authenticatorsMobileUsedByList**](AuthenticatorsApi.md#authenticatorsMobileUsedByList) | **GET** /authenticators/mobile/{uuid}/used_by/ |
[**authenticatorsSmsDestroy**](AuthenticatorsApi.md#authenticatorsSmsDestroy) | **DELETE** /authenticators/sms/{id}/ |
[**authenticatorsSmsList**](AuthenticatorsApi.md#authenticatorsSmsList) | **GET** /authenticators/sms/ |
[**authenticatorsSmsPartialUpdate**](AuthenticatorsApi.md#authenticatorsSmsPartialUpdate) | **PATCH** /authenticators/sms/{id}/ |
@@ -420,6 +436,317 @@ Name | Type | Description | Notes
### Authorization
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsAdminMobileCreate**
+> MobileDevice authenticatorsAdminMobileCreate(mobileDeviceRequest)
+
+
+
+Viewset for Mobile authenticator devices (for admins)
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val mobileDeviceRequest : MobileDeviceRequest = // MobileDeviceRequest |
+try {
+ val result : MobileDevice = apiInstance.authenticatorsAdminMobileCreate(mobileDeviceRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileCreate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileCreate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **mobileDeviceRequest** | [**MobileDeviceRequest**](MobileDeviceRequest.md)| |
+
+### Return type
+
+[**MobileDevice**](MobileDevice.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsAdminMobileDestroy**
+> authenticatorsAdminMobileDestroy(uuid)
+
+
+
+Viewset for Mobile authenticator devices (for admins)
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+try {
+ apiInstance.authenticatorsAdminMobileDestroy(uuid)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileDestroy")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileDestroy")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+
+### Return type
+
+null (empty response body)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsAdminMobileList**
+> PaginatedMobileDeviceList authenticatorsAdminMobileList(name, ordering, page, pageSize, search)
+
+
+
+Viewset for Mobile authenticator devices (for admins)
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val name : kotlin.String = name_example // kotlin.String |
+val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results.
+val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set.
+val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page.
+val search : kotlin.String = search_example // kotlin.String | A search term.
+try {
+ val result : PaginatedMobileDeviceList = apiInstance.authenticatorsAdminMobileList(name, ordering, page, pageSize, search)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileList")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileList")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **name** | **kotlin.String**| | [optional]
+ **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional]
+ **page** | **kotlin.Int**| A page number within the paginated result set. | [optional]
+ **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional]
+ **search** | **kotlin.String**| A search term. | [optional]
+
+### Return type
+
+[**PaginatedMobileDeviceList**](PaginatedMobileDeviceList.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsAdminMobilePartialUpdate**
+> MobileDevice authenticatorsAdminMobilePartialUpdate(uuid, patchedMobileDeviceRequest)
+
+
+
+Viewset for Mobile authenticator devices (for admins)
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+val patchedMobileDeviceRequest : PatchedMobileDeviceRequest = // PatchedMobileDeviceRequest |
+try {
+ val result : MobileDevice = apiInstance.authenticatorsAdminMobilePartialUpdate(uuid, patchedMobileDeviceRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobilePartialUpdate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobilePartialUpdate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+ **patchedMobileDeviceRequest** | [**PatchedMobileDeviceRequest**](PatchedMobileDeviceRequest.md)| | [optional]
+
+### Return type
+
+[**MobileDevice**](MobileDevice.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsAdminMobileRetrieve**
+> MobileDevice authenticatorsAdminMobileRetrieve(uuid)
+
+
+
+Viewset for Mobile authenticator devices (for admins)
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+try {
+ val result : MobileDevice = apiInstance.authenticatorsAdminMobileRetrieve(uuid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileRetrieve")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileRetrieve")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+
+### Return type
+
+[**MobileDevice**](MobileDevice.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsAdminMobileUpdate**
+> MobileDevice authenticatorsAdminMobileUpdate(uuid, mobileDeviceRequest)
+
+
+
+Viewset for Mobile authenticator devices (for admins)
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+val mobileDeviceRequest : MobileDeviceRequest = // MobileDeviceRequest |
+try {
+ val result : MobileDevice = apiInstance.authenticatorsAdminMobileUpdate(uuid, mobileDeviceRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsAdminMobileUpdate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsAdminMobileUpdate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+ **mobileDeviceRequest** | [**MobileDeviceRequest**](MobileDeviceRequest.md)| |
+
+### Return type
+
+[**MobileDevice**](MobileDevice.md)
+
+### Authorization
+
+
Configure authentik:
ApiClient.apiKey["Authorization"] = ""
ApiClient.apiKeyPrefix["Authorization"] = ""
@@ -2021,6 +2348,521 @@ Name | Type | Description | Notes
### Authorization
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileCheckInCreate**
+> authenticatorsMobileCheckInCreate(uuid, mobileDeviceCheckInRequest)
+
+
+
+Check in data about a device
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+val mobileDeviceCheckInRequest : MobileDeviceCheckInRequest = // MobileDeviceCheckInRequest |
+try {
+ apiInstance.authenticatorsMobileCheckInCreate(uuid, mobileDeviceCheckInRequest)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileCheckInCreate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileCheckInCreate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+ **mobileDeviceCheckInRequest** | [**MobileDeviceCheckInRequest**](MobileDeviceCheckInRequest.md)| |
+
+### Return type
+
+null (empty response body)
+
+### Authorization
+
+
+Configure mobile_device_token:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileDestroy**
+> authenticatorsMobileDestroy(uuid)
+
+
+
+Viewset for Mobile authenticator devices
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+try {
+ apiInstance.authenticatorsMobileDestroy(uuid)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileDestroy")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileDestroy")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+
+### Return type
+
+null (empty response body)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileEnrollmentCallbackCreate**
+> MobileDeviceEnrollmentCallback authenticatorsMobileEnrollmentCallbackCreate(uuid, mobileDeviceEnrollmentRequest)
+
+
+
+Enrollment callback
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+val mobileDeviceEnrollmentRequest : MobileDeviceEnrollmentRequest = // MobileDeviceEnrollmentRequest |
+try {
+ val result : MobileDeviceEnrollmentCallback = apiInstance.authenticatorsMobileEnrollmentCallbackCreate(uuid, mobileDeviceEnrollmentRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentCallbackCreate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentCallbackCreate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+ **mobileDeviceEnrollmentRequest** | [**MobileDeviceEnrollmentRequest**](MobileDeviceEnrollmentRequest.md)| |
+
+### Return type
+
+[**MobileDeviceEnrollmentCallback**](MobileDeviceEnrollmentCallback.md)
+
+### Authorization
+
+
+Configure mobile_device_token:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileEnrollmentStatusCreate**
+> MobileDeviceEnrollmentStatus authenticatorsMobileEnrollmentStatusCreate(uuid)
+
+
+
+Check device enrollment status
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+try {
+ val result : MobileDeviceEnrollmentStatus = apiInstance.authenticatorsMobileEnrollmentStatusCreate(uuid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentStatusCreate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileEnrollmentStatusCreate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+
+### Return type
+
+[**MobileDeviceEnrollmentStatus**](MobileDeviceEnrollmentStatus.md)
+
+### Authorization
+
+
+Configure mobile_device_token:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileList**
+> PaginatedMobileDeviceList authenticatorsMobileList(name, ordering, page, pageSize, search)
+
+
+
+Viewset for Mobile authenticator devices
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val name : kotlin.String = name_example // kotlin.String |
+val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results.
+val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set.
+val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page.
+val search : kotlin.String = search_example // kotlin.String | A search term.
+try {
+ val result : PaginatedMobileDeviceList = apiInstance.authenticatorsMobileList(name, ordering, page, pageSize, search)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileList")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileList")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **name** | **kotlin.String**| | [optional]
+ **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional]
+ **page** | **kotlin.Int**| A page number within the paginated result set. | [optional]
+ **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional]
+ **search** | **kotlin.String**| A search term. | [optional]
+
+### Return type
+
+[**PaginatedMobileDeviceList**](PaginatedMobileDeviceList.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsMobilePartialUpdate**
+> MobileDevice authenticatorsMobilePartialUpdate(uuid, patchedMobileDeviceRequest)
+
+
+
+Viewset for Mobile authenticator devices
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+val patchedMobileDeviceRequest : PatchedMobileDeviceRequest = // PatchedMobileDeviceRequest |
+try {
+ val result : MobileDevice = apiInstance.authenticatorsMobilePartialUpdate(uuid, patchedMobileDeviceRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobilePartialUpdate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobilePartialUpdate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+ **patchedMobileDeviceRequest** | [**PatchedMobileDeviceRequest**](PatchedMobileDeviceRequest.md)| | [optional]
+
+### Return type
+
+[**MobileDevice**](MobileDevice.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileReceiveResponseCreate**
+> authenticatorsMobileReceiveResponseCreate(uuid, mobileDeviceResponseRequest)
+
+
+
+Get response from notification on phone
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+val mobileDeviceResponseRequest : MobileDeviceResponseRequest = // MobileDeviceResponseRequest |
+try {
+ apiInstance.authenticatorsMobileReceiveResponseCreate(uuid, mobileDeviceResponseRequest)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileReceiveResponseCreate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileReceiveResponseCreate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+ **mobileDeviceResponseRequest** | [**MobileDeviceResponseRequest**](MobileDeviceResponseRequest.md)| |
+
+### Return type
+
+null (empty response body)
+
+### Authorization
+
+
+Configure mobile_device_token:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileRetrieve**
+> MobileDevice authenticatorsMobileRetrieve(uuid)
+
+
+
+Viewset for Mobile authenticator devices
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+try {
+ val result : MobileDevice = apiInstance.authenticatorsMobileRetrieve(uuid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileRetrieve")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileRetrieve")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+
+### Return type
+
+[**MobileDevice**](MobileDevice.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileUpdate**
+> MobileDevice authenticatorsMobileUpdate(uuid, mobileDeviceRequest)
+
+
+
+Viewset for Mobile authenticator devices
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+val mobileDeviceRequest : MobileDeviceRequest = // MobileDeviceRequest |
+try {
+ val result : MobileDevice = apiInstance.authenticatorsMobileUpdate(uuid, mobileDeviceRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileUpdate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileUpdate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+ **mobileDeviceRequest** | [**MobileDeviceRequest**](MobileDeviceRequest.md)| |
+
+### Return type
+
+[**MobileDevice**](MobileDevice.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **authenticatorsMobileUsedByList**
+> kotlin.collections.List<UsedBy> authenticatorsMobileUsedByList(uuid)
+
+
+
+Get a list of all objects that use this object
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = AuthenticatorsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Device.
+try {
+ val result : kotlin.collections.List = apiInstance.authenticatorsMobileUsedByList(uuid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling AuthenticatorsApi#authenticatorsMobileUsedByList")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling AuthenticatorsApi#authenticatorsMobileUsedByList")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this Mobile Device. |
+
+### Return type
+
+[**kotlin.collections.List<UsedBy>**](UsedBy.md)
+
+### Authorization
+
+
Configure authentik:
ApiClient.apiKey["Authorization"] = ""
ApiClient.apiKeyPrefix["Authorization"] = ""
diff --git a/docs/ChallengeTypes.md b/docs/ChallengeTypes.md
index 938f4aa..2361479 100644
--- a/docs/ChallengeTypes.md
+++ b/docs/ChallengeTypes.md
@@ -14,6 +14,7 @@ Name | Type | Description | Notes
**activationBarcode** | **kotlin.String** | |
**activationCode** | **kotlin.String** | |
**stageUuid** | **kotlin.String** | |
+**payload** | [**AuthenticatorMobilePayloadChallenge**](AuthenticatorMobilePayloadChallenge.md) | |
**codes** | **kotlin.collections.List<kotlin.String>** | |
**configUrl** | **kotlin.String** | |
**deviceChallenges** | [**kotlin.collections.List<DeviceChallenge>**](DeviceChallenge.md) | |
diff --git a/docs/CoreApi.md b/docs/CoreApi.md
index c1759cf..8daabc7 100644
--- a/docs/CoreApi.md
+++ b/docs/CoreApi.md
@@ -221,7 +221,7 @@ Configure authentik:
# **coreApplicationsList**
-> PaginatedApplicationList coreApplicationsList(group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList)
+> PaginatedApplicationList coreApplicationsList(forUser, group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList)
@@ -234,6 +234,7 @@ Custom list method that checks Policy based access instead of guardian
//import io.goauthentik.api.models.*
val apiInstance = CoreApi()
+val forUser : kotlin.Int = 56 // kotlin.Int |
val group : kotlin.String = group_example // kotlin.String |
val metaDescription : kotlin.String = metaDescription_example // kotlin.String |
val metaLaunchUrl : kotlin.String = metaLaunchUrl_example // kotlin.String |
@@ -246,7 +247,7 @@ val search : kotlin.String = search_example // kotlin.String | A search term.
val slug : kotlin.String = slug_example // kotlin.String |
val superuserFullList : kotlin.Boolean = true // kotlin.Boolean |
try {
- val result : PaginatedApplicationList = apiInstance.coreApplicationsList(group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList)
+ val result : PaginatedApplicationList = apiInstance.coreApplicationsList(forUser, group, metaDescription, metaLaunchUrl, metaPublisher, name, ordering, page, pageSize, search, slug, superuserFullList)
println(result)
} catch (e: ClientException) {
println("4xx response calling CoreApi#coreApplicationsList")
@@ -261,6 +262,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
+ **forUser** | **kotlin.Int**| | [optional]
**group** | **kotlin.String**| | [optional]
**metaDescription** | **kotlin.String**| | [optional]
**metaLaunchUrl** | **kotlin.String**| | [optional]
@@ -948,6 +950,9 @@ This endpoint does not need any parameter.
Configure authentik:
ApiClient.apiKey["Authorization"] = ""
ApiClient.apiKeyPrefix["Authorization"] = ""
+Configure mobile_device_token:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
### HTTP request headers
@@ -2806,6 +2811,9 @@ This endpoint does not need any parameter.
Configure authentik:
ApiClient.apiKey["Authorization"] = ""
ApiClient.apiKeyPrefix["Authorization"] = ""
+Configure mobile_device_token:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
### HTTP request headers
diff --git a/docs/Device.md b/docs/Device.md
index 84299c6..2d591da 100644
--- a/docs/Device.md
+++ b/docs/Device.md
@@ -7,10 +7,10 @@ Name | Type | Description | Notes
**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
-**pk** | **kotlin.Int** | |
+**pk** | **kotlin.String** | |
**name** | **kotlin.String** | |
**type** | **kotlin.String** | Get type of device | [readonly]
-**confirmed** | **kotlin.Boolean** | |
+**confirmed** | **kotlin.Boolean** | | [readonly]
diff --git a/docs/DeviceClassesEnum.md b/docs/DeviceClassesEnum.md
index 5e34688..aaa61bd 100644
--- a/docs/DeviceClassesEnum.md
+++ b/docs/DeviceClassesEnum.md
@@ -14,6 +14,8 @@
* `sms` (value: `"sms"`)
+ * `mobile` (value: `"mobile"`)
+
* `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`)
diff --git a/docs/DuoDevice.md b/docs/DuoDevice.md
index 92fbc79..2d83e04 100644
--- a/docs/DuoDevice.md
+++ b/docs/DuoDevice.md
@@ -4,8 +4,13 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**pk** | **kotlin.Int** | | [readonly]
-**name** | **kotlin.String** | The human-readable name of this device. |
+**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
+**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
+**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
+**type** | **kotlin.String** | Get type of device | [readonly]
+**confirmed** | **kotlin.Boolean** | | [readonly]
diff --git a/docs/DuoDeviceRequest.md b/docs/DuoDeviceRequest.md
index 2d61bc0..0bcd42b 100644
--- a/docs/DuoDeviceRequest.md
+++ b/docs/DuoDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. |
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
diff --git a/docs/EventsApi.md b/docs/EventsApi.md
index c49692e..0005d6b 100644
--- a/docs/EventsApi.md
+++ b/docs/EventsApi.md
@@ -28,6 +28,9 @@ Method | HTTP request | Description
[**eventsRulesRetrieve**](EventsApi.md#eventsRulesRetrieve) | **GET** /events/rules/{pbm_uuid}/ |
[**eventsRulesUpdate**](EventsApi.md#eventsRulesUpdate) | **PUT** /events/rules/{pbm_uuid}/ |
[**eventsRulesUsedByList**](EventsApi.md#eventsRulesUsedByList) | **GET** /events/rules/{pbm_uuid}/used_by/ |
+[**eventsSystemTasksList**](EventsApi.md#eventsSystemTasksList) | **GET** /events/system_tasks/ |
+[**eventsSystemTasksRetrieve**](EventsApi.md#eventsSystemTasksRetrieve) | **GET** /events/system_tasks/{uuid}/ |
+[**eventsSystemTasksRunCreate**](EventsApi.md#eventsSystemTasksRunCreate) | **POST** /events/system_tasks/{uuid}/run/ |
[**eventsTransportsCreate**](EventsApi.md#eventsTransportsCreate) | **POST** /events/transports/ |
[**eventsTransportsDestroy**](EventsApi.md#eventsTransportsDestroy) | **DELETE** /events/transports/{uuid}/ |
[**eventsTransportsList**](EventsApi.md#eventsTransportsList) | **GET** /events/transports/ |
@@ -1303,6 +1306,167 @@ Name | Type | Description | Notes
### Authorization
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **eventsSystemTasksList**
+> PaginatedSystemTaskList eventsSystemTasksList(name, ordering, page, pageSize, search, status, uid)
+
+
+
+Read-only view set that returns all background tasks
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = EventsApi()
+val name : kotlin.String = name_example // kotlin.String |
+val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results.
+val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set.
+val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page.
+val search : kotlin.String = search_example // kotlin.String | A search term.
+val status : kotlin.String = status_example // kotlin.String | * `unknown` - Unknown * `successful` - Successful * `warning` - Warning * `error` - Error
+val uid : kotlin.String = uid_example // kotlin.String |
+try {
+ val result : PaginatedSystemTaskList = apiInstance.eventsSystemTasksList(name, ordering, page, pageSize, search, status, uid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling EventsApi#eventsSystemTasksList")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling EventsApi#eventsSystemTasksList")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **name** | **kotlin.String**| | [optional]
+ **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional]
+ **page** | **kotlin.Int**| A page number within the paginated result set. | [optional]
+ **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional]
+ **search** | **kotlin.String**| A search term. | [optional]
+ **status** | **kotlin.String**| * `unknown` - Unknown * `successful` - Successful * `warning` - Warning * `error` - Error | [optional] [enum: error, successful, unknown, warning]
+ **uid** | **kotlin.String**| | [optional]
+
+### Return type
+
+[**PaginatedSystemTaskList**](PaginatedSystemTaskList.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **eventsSystemTasksRetrieve**
+> SystemTask eventsSystemTasksRetrieve(uuid)
+
+
+
+Read-only view set that returns all background tasks
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = EventsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this System Task.
+try {
+ val result : SystemTask = apiInstance.eventsSystemTasksRetrieve(uuid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling EventsApi#eventsSystemTasksRetrieve")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling EventsApi#eventsSystemTasksRetrieve")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this System Task. |
+
+### Return type
+
+[**SystemTask**](SystemTask.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **eventsSystemTasksRunCreate**
+> eventsSystemTasksRunCreate(uuid)
+
+
+
+Run task
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = EventsApi()
+val uuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this System Task.
+try {
+ apiInstance.eventsSystemTasksRunCreate(uuid)
+} catch (e: ClientException) {
+ println("4xx response calling EventsApi#eventsSystemTasksRunCreate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling EventsApi#eventsSystemTasksRunCreate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **uuid** | **java.util.UUID**| A UUID string identifying this System Task. |
+
+### Return type
+
+null (empty response body)
+
+### Authorization
+
+
Configure authentik:
ApiClient.apiKey["Authorization"] = ""
ApiClient.apiKeyPrefix["Authorization"] = ""
diff --git a/docs/FlowChallengeResponseRequest.md b/docs/FlowChallengeResponseRequest.md
index 18348fa..4f1d59d 100644
--- a/docs/FlowChallengeResponseRequest.md
+++ b/docs/FlowChallengeResponseRequest.md
@@ -16,6 +16,7 @@ Name | Type | Description | Notes
**selectedStage** | **kotlin.String** | | [optional]
**webauthn** | [**kotlin.collections.Map<kotlin.String, kotlin.Any>**](kotlin.Any.md) | | [optional]
**duo** | **kotlin.Int** | | [optional]
+**mobile** | **kotlin.String** | | [optional]
diff --git a/docs/ItemMatchingModeEnum.md b/docs/ItemMatchingModeEnum.md
new file mode 100644
index 0000000..71e6726
--- /dev/null
+++ b/docs/ItemMatchingModeEnum.md
@@ -0,0 +1,16 @@
+
+# ItemMatchingModeEnum
+
+## Enum
+
+
+ * `acceptDeny` (value: `"accept_deny"`)
+
+ * `numberMatching2` (value: `"number_matching_2"`)
+
+ * `numberMatching3` (value: `"number_matching_3"`)
+
+ * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`)
+
+
+
diff --git a/docs/LDAPSyncStatus.md b/docs/LDAPSyncStatus.md
index 45b6225..c48e625 100644
--- a/docs/LDAPSyncStatus.md
+++ b/docs/LDAPSyncStatus.md
@@ -5,7 +5,7 @@
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**isRunning** | **kotlin.Boolean** | | [readonly]
-**tasks** | [**kotlin.collections.List<Task>**](Task.md) | | [readonly]
+**tasks** | [**kotlin.collections.List<SystemTask>**](SystemTask.md) | | [readonly]
diff --git a/docs/MobileDevice.md b/docs/MobileDevice.md
new file mode 100644
index 0000000..8246b5e
--- /dev/null
+++ b/docs/MobileDevice.md
@@ -0,0 +1,18 @@
+
+# MobileDevice
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
+**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
+**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
+**type** | **kotlin.String** | Get type of device | [readonly]
+**confirmed** | **kotlin.Boolean** | | [readonly]
+**state** | [**MobileDeviceInfo**](MobileDeviceInfo.md) | | [readonly]
+**lastCheckin** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly]
+
+
+
diff --git a/docs/MobileDeviceCheckInRequest.md b/docs/MobileDeviceCheckInRequest.md
new file mode 100644
index 0000000..abbe473
--- /dev/null
+++ b/docs/MobileDeviceCheckInRequest.md
@@ -0,0 +1,11 @@
+
+# MobileDeviceCheckInRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**info** | [**MobileDeviceInfoRequest**](MobileDeviceInfoRequest.md) | |
+**firebaseKey** | **kotlin.String** | | [optional]
+
+
+
diff --git a/docs/MobileDeviceEnrollmentCallback.md b/docs/MobileDeviceEnrollmentCallback.md
new file mode 100644
index 0000000..8ed18ef
--- /dev/null
+++ b/docs/MobileDeviceEnrollmentCallback.md
@@ -0,0 +1,10 @@
+
+# MobileDeviceEnrollmentCallback
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**token** | **kotlin.String** | |
+
+
+
diff --git a/docs/MobileDeviceEnrollmentRequest.md b/docs/MobileDeviceEnrollmentRequest.md
new file mode 100644
index 0000000..97ed05f
--- /dev/null
+++ b/docs/MobileDeviceEnrollmentRequest.md
@@ -0,0 +1,12 @@
+
+# MobileDeviceEnrollmentRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**deviceUid** | **kotlin.String** | |
+**info** | [**MobileDeviceInfoRequest**](MobileDeviceInfoRequest.md) | |
+**firebaseKey** | **kotlin.String** | | [optional]
+
+
+
diff --git a/docs/MobileDeviceEnrollmentStatus.md b/docs/MobileDeviceEnrollmentStatus.md
new file mode 100644
index 0000000..7731c56
--- /dev/null
+++ b/docs/MobileDeviceEnrollmentStatus.md
@@ -0,0 +1,10 @@
+
+# MobileDeviceEnrollmentStatus
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**status** | [**MobileDeviceEnrollmentStatusStatusEnum**](MobileDeviceEnrollmentStatusStatusEnum.md) | |
+
+
+
diff --git a/docs/MobileDeviceEnrollmentStatusStatusEnum.md b/docs/MobileDeviceEnrollmentStatusStatusEnum.md
new file mode 100644
index 0000000..b5ba9cc
--- /dev/null
+++ b/docs/MobileDeviceEnrollmentStatusStatusEnum.md
@@ -0,0 +1,14 @@
+
+# MobileDeviceEnrollmentStatusStatusEnum
+
+## Enum
+
+
+ * `success` (value: `"success"`)
+
+ * `waiting` (value: `"waiting"`)
+
+ * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`)
+
+
+
diff --git a/docs/MobileDeviceInfo.md b/docs/MobileDeviceInfo.md
new file mode 100644
index 0000000..86e4220
--- /dev/null
+++ b/docs/MobileDeviceInfo.md
@@ -0,0 +1,15 @@
+
+# MobileDeviceInfo
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**platform** | [**PlatformEnum**](PlatformEnum.md) | |
+**osVersion** | **kotlin.String** | |
+**model** | **kotlin.String** | |
+**hostname** | **kotlin.String** | |
+**appVersion** | **kotlin.String** | |
+**others** | [**kotlin.Any**](.md) | |
+
+
+
diff --git a/docs/MobileDeviceInfoRequest.md b/docs/MobileDeviceInfoRequest.md
new file mode 100644
index 0000000..757a0f5
--- /dev/null
+++ b/docs/MobileDeviceInfoRequest.md
@@ -0,0 +1,15 @@
+
+# MobileDeviceInfoRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**platform** | [**PlatformEnum**](PlatformEnum.md) | |
+**osVersion** | **kotlin.String** | |
+**model** | **kotlin.String** | |
+**hostname** | **kotlin.String** | |
+**appVersion** | **kotlin.String** | |
+**others** | [**kotlin.Any**](.md) | |
+
+
+
diff --git a/docs/MobileDeviceRequest.md b/docs/MobileDeviceRequest.md
new file mode 100644
index 0000000..34f5853
--- /dev/null
+++ b/docs/MobileDeviceRequest.md
@@ -0,0 +1,11 @@
+
+# MobileDeviceRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
+
+
+
diff --git a/docs/MobileDeviceResponseRequest.md b/docs/MobileDeviceResponseRequest.md
new file mode 100644
index 0000000..b0b0888
--- /dev/null
+++ b/docs/MobileDeviceResponseRequest.md
@@ -0,0 +1,11 @@
+
+# MobileDeviceResponseRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**txId** | [**java.util.UUID**](java.util.UUID.md) | |
+**selectedItem** | **kotlin.String** | |
+
+
+
diff --git a/docs/ModelEnum.md b/docs/ModelEnum.md
index fa8c585..8ecb379 100644
--- a/docs/ModelEnum.md
+++ b/docs/ModelEnum.md
@@ -40,8 +40,6 @@
* `policiesReputationPeriodReputationpolicy` (value: `"authentik_policies_reputation.reputationpolicy"`)
- * `policiesReputationPeriodReputation` (value: `"authentik_policies_reputation.reputation"`)
-
* `policiesPeriodPolicybinding` (value: `"authentik_policies.policybinding"`)
* `providersLdapPeriodLdapprovider` (value: `"authentik_providers_ldap.ldapprovider"`)
@@ -50,12 +48,6 @@
* `providersOauth2PeriodOauth2provider` (value: `"authentik_providers_oauth2.oauth2provider"`)
- * `providersOauth2PeriodAuthorizationcode` (value: `"authentik_providers_oauth2.authorizationcode"`)
-
- * `providersOauth2PeriodAccesstoken` (value: `"authentik_providers_oauth2.accesstoken"`)
-
- * `providersOauth2PeriodRefreshtoken` (value: `"authentik_providers_oauth2.refreshtoken"`)
-
* `providersProxyPeriodProxyprovider` (value: `"authentik_providers_proxy.proxyprovider"`)
* `providersRadiusPeriodRadiusprovider` (value: `"authentik_providers_radius.radiusprovider"`)
@@ -90,6 +82,10 @@
* `stagesAuthenticatorDuoPeriodDuodevice` (value: `"authentik_stages_authenticator_duo.duodevice"`)
+ * `stagesAuthenticatorMobilePeriodAuthenticatormobilestage` (value: `"authentik_stages_authenticator_mobile.authenticatormobilestage"`)
+
+ * `stagesAuthenticatorMobilePeriodMobiledevice` (value: `"authentik_stages_authenticator_mobile.mobiledevice"`)
+
* `stagesAuthenticatorSmsPeriodAuthenticatorsmsstage` (value: `"authentik_stages_authenticator_sms.authenticatorsmsstage"`)
* `stagesAuthenticatorSmsPeriodSmsdevice` (value: `"authentik_stages_authenticator_sms.smsdevice"`)
diff --git a/docs/PaginatedAuthenticatorMobileStageList.md b/docs/PaginatedAuthenticatorMobileStageList.md
new file mode 100644
index 0000000..ef8c2b9
--- /dev/null
+++ b/docs/PaginatedAuthenticatorMobileStageList.md
@@ -0,0 +1,11 @@
+
+# PaginatedAuthenticatorMobileStageList
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**pagination** | [**Pagination**](Pagination.md) | |
+**results** | [**kotlin.collections.List<AuthenticatorMobileStage>**](AuthenticatorMobileStage.md) | |
+
+
+
diff --git a/docs/PaginatedMobileDeviceList.md b/docs/PaginatedMobileDeviceList.md
new file mode 100644
index 0000000..dc5db44
--- /dev/null
+++ b/docs/PaginatedMobileDeviceList.md
@@ -0,0 +1,11 @@
+
+# PaginatedMobileDeviceList
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**pagination** | [**Pagination**](Pagination.md) | |
+**results** | [**kotlin.collections.List<MobileDevice>**](MobileDevice.md) | |
+
+
+
diff --git a/docs/PaginatedSystemTaskList.md b/docs/PaginatedSystemTaskList.md
new file mode 100644
index 0000000..1be74ba
--- /dev/null
+++ b/docs/PaginatedSystemTaskList.md
@@ -0,0 +1,11 @@
+
+# PaginatedSystemTaskList
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**pagination** | [**Pagination**](Pagination.md) | |
+**results** | [**kotlin.collections.List<SystemTask>**](SystemTask.md) | |
+
+
+
diff --git a/docs/PatchedAuthenticatorMobileStageRequest.md b/docs/PatchedAuthenticatorMobileStageRequest.md
new file mode 100644
index 0000000..522afdf
--- /dev/null
+++ b/docs/PatchedAuthenticatorMobileStageRequest.md
@@ -0,0 +1,15 @@
+
+# PatchedAuthenticatorMobileStageRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**name** | **kotlin.String** | | [optional]
+**flowSet** | [**kotlin.collections.List<FlowSetRequest>**](FlowSetRequest.md) | | [optional]
+**configureFlow** | [**java.util.UUID**](java.util.UUID.md) | Flow used by an authenticated user to configure this Stage. If empty, user will not be able to configure this stage. | [optional]
+**friendlyName** | **kotlin.String** | | [optional]
+**itemMatchingMode** | [**ItemMatchingModeEnum**](ItemMatchingModeEnum.md) | | [optional]
+**cgwEndpoint** | **kotlin.String** | | [optional]
+
+
+
diff --git a/docs/PatchedDuoDeviceRequest.md b/docs/PatchedDuoDeviceRequest.md
index b958e0b..4d5fe83 100644
--- a/docs/PatchedDuoDeviceRequest.md
+++ b/docs/PatchedDuoDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. | [optional]
+**pk** | **kotlin.String** | | [optional]
+**name** | **kotlin.String** | | [optional]
diff --git a/docs/PatchedMobileDeviceRequest.md b/docs/PatchedMobileDeviceRequest.md
new file mode 100644
index 0000000..78cb12a
--- /dev/null
+++ b/docs/PatchedMobileDeviceRequest.md
@@ -0,0 +1,11 @@
+
+# PatchedMobileDeviceRequest
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**pk** | **kotlin.String** | | [optional]
+**name** | **kotlin.String** | | [optional]
+
+
+
diff --git a/docs/PatchedSMSDeviceRequest.md b/docs/PatchedSMSDeviceRequest.md
index c302a50..da7b7db 100644
--- a/docs/PatchedSMSDeviceRequest.md
+++ b/docs/PatchedSMSDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. | [optional]
+**pk** | **kotlin.String** | | [optional]
+**name** | **kotlin.String** | | [optional]
diff --git a/docs/PatchedStaticDeviceRequest.md b/docs/PatchedStaticDeviceRequest.md
index 3f14be5..6d6b70e 100644
--- a/docs/PatchedStaticDeviceRequest.md
+++ b/docs/PatchedStaticDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. | [optional]
+**pk** | **kotlin.String** | | [optional]
+**name** | **kotlin.String** | | [optional]
diff --git a/docs/PatchedTOTPDeviceRequest.md b/docs/PatchedTOTPDeviceRequest.md
index 20f0ad8..8c009ab 100644
--- a/docs/PatchedTOTPDeviceRequest.md
+++ b/docs/PatchedTOTPDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. | [optional]
+**pk** | **kotlin.String** | | [optional]
+**name** | **kotlin.String** | | [optional]
diff --git a/docs/PatchedWebAuthnDeviceRequest.md b/docs/PatchedWebAuthnDeviceRequest.md
index d57ab82..c9caabc 100644
--- a/docs/PatchedWebAuthnDeviceRequest.md
+++ b/docs/PatchedWebAuthnDeviceRequest.md
@@ -4,6 +4,7 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
+**pk** | **kotlin.String** | | [optional]
**name** | **kotlin.String** | | [optional]
diff --git a/docs/PlatformEnum.md b/docs/PlatformEnum.md
new file mode 100644
index 0000000..94e0ec2
--- /dev/null
+++ b/docs/PlatformEnum.md
@@ -0,0 +1,16 @@
+
+# PlatformEnum
+
+## Enum
+
+
+ * `ios` (value: `"ios"`)
+
+ * `android` (value: `"android"`)
+
+ * `other` (value: `"other"`)
+
+ * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`)
+
+
+
diff --git a/docs/ProvidersApi.md b/docs/ProvidersApi.md
index 0d9103f..2f0cbd6 100644
--- a/docs/ProvidersApi.md
+++ b/docs/ProvidersApi.md
@@ -939,7 +939,7 @@ Configure authentik:
# **providersOauth2PreviewUserRetrieve**
-> PropertyMappingPreview providersOauth2PreviewUserRetrieve(id)
+> PropertyMappingPreview providersOauth2PreviewUserRetrieve(id, forUser)
@@ -953,8 +953,9 @@ Preview user data for provider
val apiInstance = ProvidersApi()
val id : kotlin.Int = 56 // kotlin.Int | A unique integer value identifying this OAuth2/OpenID Provider.
+val forUser : kotlin.Int = 56 // kotlin.Int |
try {
- val result : PropertyMappingPreview = apiInstance.providersOauth2PreviewUserRetrieve(id)
+ val result : PropertyMappingPreview = apiInstance.providersOauth2PreviewUserRetrieve(id, forUser)
println(result)
} catch (e: ClientException) {
println("4xx response calling ProvidersApi#providersOauth2PreviewUserRetrieve")
@@ -970,6 +971,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
**id** | **kotlin.Int**| A unique integer value identifying this OAuth2/OpenID Provider. |
+ **forUser** | **kotlin.Int**| | [optional]
### Return type
@@ -2664,7 +2666,7 @@ Configure authentik:
# **providersSamlPreviewUserRetrieve**
-> PropertyMappingPreview providersSamlPreviewUserRetrieve(id)
+> PropertyMappingPreview providersSamlPreviewUserRetrieve(id, forUser)
@@ -2678,8 +2680,9 @@ Preview user data for provider
val apiInstance = ProvidersApi()
val id : kotlin.Int = 56 // kotlin.Int | A unique integer value identifying this SAML Provider.
+val forUser : kotlin.Int = 56 // kotlin.Int |
try {
- val result : PropertyMappingPreview = apiInstance.providersSamlPreviewUserRetrieve(id)
+ val result : PropertyMappingPreview = apiInstance.providersSamlPreviewUserRetrieve(id, forUser)
println(result)
} catch (e: ClientException) {
println("4xx response calling ProvidersApi#providersSamlPreviewUserRetrieve")
@@ -2695,6 +2698,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
**id** | **kotlin.Int**| A unique integer value identifying this SAML Provider. |
+ **forUser** | **kotlin.Int**| | [optional]
### Return type
diff --git a/docs/RbacApi.md b/docs/RbacApi.md
index d975dad..7b3712d 100644
--- a/docs/RbacApi.md
+++ b/docs/RbacApi.md
@@ -89,7 +89,7 @@ Get assigned object permissions for a single object
//import io.goauthentik.api.models.*
val apiInstance = RbacApi()
-val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping
+val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping
val objectPk : kotlin.String = objectPk_example // kotlin.String |
val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results.
val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set.
@@ -111,7 +111,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
- **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputation, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.accesstoken, authentik_providers_oauth2.authorizationcode, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.refreshtoken, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain]
+ **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_mobile.authenticatormobilestage, authentik_stages_authenticator_mobile.mobiledevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain]
**objectPk** | **kotlin.String**| | [optional]
**ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional]
**page** | **kotlin.Int**| A page number within the paginated result set. | [optional]
@@ -251,7 +251,7 @@ Get assigned object permissions for a single object
//import io.goauthentik.api.models.*
val apiInstance = RbacApi()
-val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping
+val model : kotlin.String = model_example // kotlin.String | * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping
val objectPk : kotlin.String = objectPk_example // kotlin.String |
val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results.
val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set.
@@ -273,7 +273,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
- **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies_reputation.reputation` - Reputation Score * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_oauth2.authorizationcode` - Authorization Code * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputation, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.accesstoken, authentik_providers_oauth2.authorizationcode, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.refreshtoken, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain]
+ **model** | **kotlin.String**| * `authentik_tenants.domain` - Domain * `authentik_crypto.certificatekeypair` - Certificate-Key Pair * `authentik_events.event` - Event * `authentik_events.notificationtransport` - Notification Transport * `authentik_events.notification` - Notification * `authentik_events.notificationrule` - Notification Rule * `authentik_events.notificationwebhookmapping` - Webhook Mapping * `authentik_flows.flow` - Flow * `authentik_flows.flowstagebinding` - Flow Stage Binding * `authentik_outposts.dockerserviceconnection` - Docker Service-Connection * `authentik_outposts.kubernetesserviceconnection` - Kubernetes Service-Connection * `authentik_outposts.outpost` - Outpost * `authentik_policies_dummy.dummypolicy` - Dummy Policy * `authentik_policies_event_matcher.eventmatcherpolicy` - Event Matcher Policy * `authentik_policies_expiry.passwordexpirypolicy` - Password Expiry Policy * `authentik_policies_expression.expressionpolicy` - Expression Policy * `authentik_policies_password.passwordpolicy` - Password Policy * `authentik_policies_reputation.reputationpolicy` - Reputation Policy * `authentik_policies.policybinding` - Policy Binding * `authentik_providers_ldap.ldapprovider` - LDAP Provider * `authentik_providers_oauth2.scopemapping` - Scope Mapping * `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider * `authentik_providers_proxy.proxyprovider` - Proxy Provider * `authentik_providers_radius.radiusprovider` - Radius Provider * `authentik_providers_saml.samlprovider` - SAML Provider * `authentik_providers_saml.samlpropertymapping` - SAML Property Mapping * `authentik_providers_scim.scimprovider` - SCIM Provider * `authentik_providers_scim.scimmapping` - SCIM Mapping * `authentik_rbac.role` - Role * `authentik_sources_ldap.ldapsource` - LDAP Source * `authentik_sources_ldap.ldappropertymapping` - LDAP Property Mapping * `authentik_sources_oauth.oauthsource` - OAuth Source * `authentik_sources_oauth.useroauthsourceconnection` - User OAuth Source Connection * `authentik_sources_plex.plexsource` - Plex Source * `authentik_sources_plex.plexsourceconnection` - User Plex Source Connection * `authentik_sources_saml.samlsource` - SAML Source * `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection * `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage * `authentik_stages_authenticator_duo.duodevice` - Duo Device * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device * `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage * `authentik_stages_authenticator_sms.smsdevice` - SMS Device * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage * `authentik_stages_authenticator_static.staticdevice` - Static Device * `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage * `authentik_stages_authenticator_totp.totpdevice` - TOTP Device * `authentik_stages_authenticator_validate.authenticatorvalidatestage` - Authenticator Validation Stage * `authentik_stages_authenticator_webauthn.authenticatewebauthnstage` - WebAuthn Authenticator Setup Stage * `authentik_stages_authenticator_webauthn.webauthndevice` - WebAuthn Device * `authentik_stages_captcha.captchastage` - Captcha Stage * `authentik_stages_consent.consentstage` - Consent Stage * `authentik_stages_consent.userconsent` - User Consent * `authentik_stages_deny.denystage` - Deny Stage * `authentik_stages_dummy.dummystage` - Dummy Stage * `authentik_stages_email.emailstage` - Email Stage * `authentik_stages_identification.identificationstage` - Identification Stage * `authentik_stages_invitation.invitationstage` - Invitation Stage * `authentik_stages_invitation.invitation` - Invitation * `authentik_stages_password.passwordstage` - Password Stage * `authentik_stages_prompt.prompt` - Prompt * `authentik_stages_prompt.promptstage` - Prompt Stage * `authentik_stages_user_delete.userdeletestage` - User Delete Stage * `authentik_stages_user_login.userloginstage` - User Login Stage * `authentik_stages_user_logout.userlogoutstage` - User Logout Stage * `authentik_stages_user_write.userwritestage` - User Write Stage * `authentik_brands.brand` - Brand * `authentik_blueprints.blueprintinstance` - Blueprint Instance * `authentik_core.group` - Group * `authentik_core.user` - User * `authentik_core.application` - Application * `authentik_core.token` - Token * `authentik_enterprise.license` - License * `authentik_providers_rac.racprovider` - RAC Provider * `authentik_providers_rac.endpoint` - RAC Endpoint * `authentik_providers_rac.racpropertymapping` - RAC Property Mapping | [enum: authentik_blueprints.blueprintinstance, authentik_brands.brand, authentik_core.application, authentik_core.group, authentik_core.token, authentik_core.user, authentik_crypto.certificatekeypair, authentik_enterprise.license, authentik_events.event, authentik_events.notification, authentik_events.notificationrule, authentik_events.notificationtransport, authentik_events.notificationwebhookmapping, authentik_flows.flow, authentik_flows.flowstagebinding, authentik_outposts.dockerserviceconnection, authentik_outposts.kubernetesserviceconnection, authentik_outposts.outpost, authentik_policies.policybinding, authentik_policies_dummy.dummypolicy, authentik_policies_event_matcher.eventmatcherpolicy, authentik_policies_expiry.passwordexpirypolicy, authentik_policies_expression.expressionpolicy, authentik_policies_password.passwordpolicy, authentik_policies_reputation.reputationpolicy, authentik_providers_ldap.ldapprovider, authentik_providers_oauth2.oauth2provider, authentik_providers_oauth2.scopemapping, authentik_providers_proxy.proxyprovider, authentik_providers_rac.endpoint, authentik_providers_rac.racpropertymapping, authentik_providers_rac.racprovider, authentik_providers_radius.radiusprovider, authentik_providers_saml.samlpropertymapping, authentik_providers_saml.samlprovider, authentik_providers_scim.scimmapping, authentik_providers_scim.scimprovider, authentik_rbac.role, authentik_sources_ldap.ldappropertymapping, authentik_sources_ldap.ldapsource, authentik_sources_oauth.oauthsource, authentik_sources_oauth.useroauthsourceconnection, authentik_sources_plex.plexsource, authentik_sources_plex.plexsourceconnection, authentik_sources_saml.samlsource, authentik_sources_saml.usersamlsourceconnection, authentik_stages_authenticator_duo.authenticatorduostage, authentik_stages_authenticator_duo.duodevice, authentik_stages_authenticator_mobile.authenticatormobilestage, authentik_stages_authenticator_mobile.mobiledevice, authentik_stages_authenticator_sms.authenticatorsmsstage, authentik_stages_authenticator_sms.smsdevice, authentik_stages_authenticator_static.authenticatorstaticstage, authentik_stages_authenticator_static.staticdevice, authentik_stages_authenticator_totp.authenticatortotpstage, authentik_stages_authenticator_totp.totpdevice, authentik_stages_authenticator_validate.authenticatorvalidatestage, authentik_stages_authenticator_webauthn.authenticatewebauthnstage, authentik_stages_authenticator_webauthn.webauthndevice, authentik_stages_captcha.captchastage, authentik_stages_consent.consentstage, authentik_stages_consent.userconsent, authentik_stages_deny.denystage, authentik_stages_dummy.dummystage, authentik_stages_email.emailstage, authentik_stages_identification.identificationstage, authentik_stages_invitation.invitation, authentik_stages_invitation.invitationstage, authentik_stages_password.passwordstage, authentik_stages_prompt.prompt, authentik_stages_prompt.promptstage, authentik_stages_user_delete.userdeletestage, authentik_stages_user_login.userloginstage, authentik_stages_user_logout.userlogoutstage, authentik_stages_user_write.userwritestage, authentik_tenants.domain]
**objectPk** | **kotlin.String**| | [optional]
**ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional]
**page** | **kotlin.Int**| A page number within the paginated result set. | [optional]
diff --git a/docs/SCIMSyncStatus.md b/docs/SCIMSyncStatus.md
index 4db96f5..d0c7252 100644
--- a/docs/SCIMSyncStatus.md
+++ b/docs/SCIMSyncStatus.md
@@ -5,7 +5,7 @@
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
**isRunning** | **kotlin.Boolean** | | [readonly]
-**tasks** | [**kotlin.collections.List<Task>**](Task.md) | | [readonly]
+**tasks** | [**kotlin.collections.List<SystemTask>**](SystemTask.md) | | [readonly]
diff --git a/docs/SMSDevice.md b/docs/SMSDevice.md
index 9c78f75..343d5c3 100644
--- a/docs/SMSDevice.md
+++ b/docs/SMSDevice.md
@@ -4,9 +4,13 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. |
-**pk** | **kotlin.Int** | | [readonly]
-**phoneNumber** | **kotlin.String** | | [readonly]
+**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
+**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
+**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
+**type** | **kotlin.String** | Get type of device | [readonly]
+**confirmed** | **kotlin.Boolean** | | [readonly]
diff --git a/docs/SMSDeviceRequest.md b/docs/SMSDeviceRequest.md
index 7b9078c..614ec2b 100644
--- a/docs/SMSDeviceRequest.md
+++ b/docs/SMSDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. |
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
diff --git a/docs/StagesApi.md b/docs/StagesApi.md
index e7ff1fa..22247de 100644
--- a/docs/StagesApi.md
+++ b/docs/StagesApi.md
@@ -20,6 +20,13 @@ Method | HTTP request | Description
[**stagesAuthenticatorDuoRetrieve**](StagesApi.md#stagesAuthenticatorDuoRetrieve) | **GET** /stages/authenticator/duo/{stage_uuid}/ |
[**stagesAuthenticatorDuoUpdate**](StagesApi.md#stagesAuthenticatorDuoUpdate) | **PUT** /stages/authenticator/duo/{stage_uuid}/ |
[**stagesAuthenticatorDuoUsedByList**](StagesApi.md#stagesAuthenticatorDuoUsedByList) | **GET** /stages/authenticator/duo/{stage_uuid}/used_by/ |
+[**stagesAuthenticatorMobileCreate**](StagesApi.md#stagesAuthenticatorMobileCreate) | **POST** /stages/authenticator/mobile/ |
+[**stagesAuthenticatorMobileDestroy**](StagesApi.md#stagesAuthenticatorMobileDestroy) | **DELETE** /stages/authenticator/mobile/{stage_uuid}/ |
+[**stagesAuthenticatorMobileList**](StagesApi.md#stagesAuthenticatorMobileList) | **GET** /stages/authenticator/mobile/ |
+[**stagesAuthenticatorMobilePartialUpdate**](StagesApi.md#stagesAuthenticatorMobilePartialUpdate) | **PATCH** /stages/authenticator/mobile/{stage_uuid}/ |
+[**stagesAuthenticatorMobileRetrieve**](StagesApi.md#stagesAuthenticatorMobileRetrieve) | **GET** /stages/authenticator/mobile/{stage_uuid}/ |
+[**stagesAuthenticatorMobileUpdate**](StagesApi.md#stagesAuthenticatorMobileUpdate) | **PUT** /stages/authenticator/mobile/{stage_uuid}/ |
+[**stagesAuthenticatorMobileUsedByList**](StagesApi.md#stagesAuthenticatorMobileUsedByList) | **GET** /stages/authenticator/mobile/{stage_uuid}/used_by/ |
[**stagesAuthenticatorSmsCreate**](StagesApi.md#stagesAuthenticatorSmsCreate) | **POST** /stages/authenticator/sms/ |
[**stagesAuthenticatorSmsDestroy**](StagesApi.md#stagesAuthenticatorSmsDestroy) | **DELETE** /stages/authenticator/sms/{stage_uuid}/ |
[**stagesAuthenticatorSmsList**](StagesApi.md#stagesAuthenticatorSmsList) | **GET** /stages/authenticator/sms/ |
@@ -972,6 +979,369 @@ Name | Type | Description | Notes
### Authorization
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **stagesAuthenticatorMobileCreate**
+> AuthenticatorMobileStage stagesAuthenticatorMobileCreate(authenticatorMobileStageRequest)
+
+
+
+AuthenticatorMobileStage Viewset
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = StagesApi()
+val authenticatorMobileStageRequest : AuthenticatorMobileStageRequest = // AuthenticatorMobileStageRequest |
+try {
+ val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobileCreate(authenticatorMobileStageRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling StagesApi#stagesAuthenticatorMobileCreate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling StagesApi#stagesAuthenticatorMobileCreate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **authenticatorMobileStageRequest** | [**AuthenticatorMobileStageRequest**](AuthenticatorMobileStageRequest.md)| |
+
+### Return type
+
+[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **stagesAuthenticatorMobileDestroy**
+> stagesAuthenticatorMobileDestroy(stageUuid)
+
+
+
+AuthenticatorMobileStage Viewset
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = StagesApi()
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage.
+try {
+ apiInstance.stagesAuthenticatorMobileDestroy(stageUuid)
+} catch (e: ClientException) {
+ println("4xx response calling StagesApi#stagesAuthenticatorMobileDestroy")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling StagesApi#stagesAuthenticatorMobileDestroy")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. |
+
+### Return type
+
+null (empty response body)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **stagesAuthenticatorMobileList**
+> PaginatedAuthenticatorMobileStageList stagesAuthenticatorMobileList(configureFlow, name, ordering, page, pageSize, search)
+
+
+
+AuthenticatorMobileStage Viewset
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = StagesApi()
+val configureFlow : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID |
+val name : kotlin.String = name_example // kotlin.String |
+val ordering : kotlin.String = ordering_example // kotlin.String | Which field to use when ordering the results.
+val page : kotlin.Int = 56 // kotlin.Int | A page number within the paginated result set.
+val pageSize : kotlin.Int = 56 // kotlin.Int | Number of results to return per page.
+val search : kotlin.String = search_example // kotlin.String | A search term.
+try {
+ val result : PaginatedAuthenticatorMobileStageList = apiInstance.stagesAuthenticatorMobileList(configureFlow, name, ordering, page, pageSize, search)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling StagesApi#stagesAuthenticatorMobileList")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling StagesApi#stagesAuthenticatorMobileList")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **configureFlow** | **java.util.UUID**| | [optional]
+ **name** | **kotlin.String**| | [optional]
+ **ordering** | **kotlin.String**| Which field to use when ordering the results. | [optional]
+ **page** | **kotlin.Int**| A page number within the paginated result set. | [optional]
+ **pageSize** | **kotlin.Int**| Number of results to return per page. | [optional]
+ **search** | **kotlin.String**| A search term. | [optional]
+
+### Return type
+
+[**PaginatedAuthenticatorMobileStageList**](PaginatedAuthenticatorMobileStageList.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **stagesAuthenticatorMobilePartialUpdate**
+> AuthenticatorMobileStage stagesAuthenticatorMobilePartialUpdate(stageUuid, patchedAuthenticatorMobileStageRequest)
+
+
+
+AuthenticatorMobileStage Viewset
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = StagesApi()
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage.
+val patchedAuthenticatorMobileStageRequest : PatchedAuthenticatorMobileStageRequest = // PatchedAuthenticatorMobileStageRequest |
+try {
+ val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobilePartialUpdate(stageUuid, patchedAuthenticatorMobileStageRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling StagesApi#stagesAuthenticatorMobilePartialUpdate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling StagesApi#stagesAuthenticatorMobilePartialUpdate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. |
+ **patchedAuthenticatorMobileStageRequest** | [**PatchedAuthenticatorMobileStageRequest**](PatchedAuthenticatorMobileStageRequest.md)| | [optional]
+
+### Return type
+
+[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **stagesAuthenticatorMobileRetrieve**
+> AuthenticatorMobileStage stagesAuthenticatorMobileRetrieve(stageUuid)
+
+
+
+AuthenticatorMobileStage Viewset
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = StagesApi()
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage.
+try {
+ val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobileRetrieve(stageUuid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling StagesApi#stagesAuthenticatorMobileRetrieve")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling StagesApi#stagesAuthenticatorMobileRetrieve")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. |
+
+### Return type
+
+[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: Not defined
+ - **Accept**: application/json
+
+
+# **stagesAuthenticatorMobileUpdate**
+> AuthenticatorMobileStage stagesAuthenticatorMobileUpdate(stageUuid, authenticatorMobileStageRequest)
+
+
+
+AuthenticatorMobileStage Viewset
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = StagesApi()
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage.
+val authenticatorMobileStageRequest : AuthenticatorMobileStageRequest = // AuthenticatorMobileStageRequest |
+try {
+ val result : AuthenticatorMobileStage = apiInstance.stagesAuthenticatorMobileUpdate(stageUuid, authenticatorMobileStageRequest)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling StagesApi#stagesAuthenticatorMobileUpdate")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling StagesApi#stagesAuthenticatorMobileUpdate")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. |
+ **authenticatorMobileStageRequest** | [**AuthenticatorMobileStageRequest**](AuthenticatorMobileStageRequest.md)| |
+
+### Return type
+
+[**AuthenticatorMobileStage**](AuthenticatorMobileStage.md)
+
+### Authorization
+
+
+Configure authentik:
+ ApiClient.apiKey["Authorization"] = ""
+ ApiClient.apiKeyPrefix["Authorization"] = ""
+
+### HTTP request headers
+
+ - **Content-Type**: application/json
+ - **Accept**: application/json
+
+
+# **stagesAuthenticatorMobileUsedByList**
+> kotlin.collections.List<UsedBy> stagesAuthenticatorMobileUsedByList(stageUuid)
+
+
+
+Get a list of all objects that use this object
+
+### Example
+```kotlin
+// Import classes:
+//import io.goauthentik.api.infrastructure.*
+//import io.goauthentik.api.models.*
+
+val apiInstance = StagesApi()
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Mobile Authenticator Setup Stage.
+try {
+ val result : kotlin.collections.List = apiInstance.stagesAuthenticatorMobileUsedByList(stageUuid)
+ println(result)
+} catch (e: ClientException) {
+ println("4xx response calling StagesApi#stagesAuthenticatorMobileUsedByList")
+ e.printStackTrace()
+} catch (e: ServerException) {
+ println("5xx response calling StagesApi#stagesAuthenticatorMobileUsedByList")
+ e.printStackTrace()
+}
+```
+
+### Parameters
+
+Name | Type | Description | Notes
+------------- | ------------- | ------------- | -------------
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Mobile Authenticator Setup Stage. |
+
+### Return type
+
+[**kotlin.collections.List<UsedBy>**](UsedBy.md)
+
+### Authorization
+
+
Configure authentik:
ApiClient.apiKey["Authorization"] = ""
ApiClient.apiKeyPrefix["Authorization"] = ""
@@ -1429,7 +1799,7 @@ AuthenticatorStaticStage Viewset
//import io.goauthentik.api.models.*
val apiInstance = StagesApi()
-val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage.
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage.
try {
apiInstance.stagesAuthenticatorStaticDestroy(stageUuid)
} catch (e: ClientException) {
@@ -1445,7 +1815,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
- **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. |
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. |
### Return type
@@ -1546,7 +1916,7 @@ AuthenticatorStaticStage Viewset
//import io.goauthentik.api.models.*
val apiInstance = StagesApi()
-val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage.
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage.
val patchedAuthenticatorStaticStageRequest : PatchedAuthenticatorStaticStageRequest = // PatchedAuthenticatorStaticStageRequest |
try {
val result : AuthenticatorStaticStage = apiInstance.stagesAuthenticatorStaticPartialUpdate(stageUuid, patchedAuthenticatorStaticStageRequest)
@@ -1564,7 +1934,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
- **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. |
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. |
**patchedAuthenticatorStaticStageRequest** | [**PatchedAuthenticatorStaticStageRequest**](PatchedAuthenticatorStaticStageRequest.md)| | [optional]
### Return type
@@ -1598,7 +1968,7 @@ AuthenticatorStaticStage Viewset
//import io.goauthentik.api.models.*
val apiInstance = StagesApi()
-val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage.
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage.
try {
val result : AuthenticatorStaticStage = apiInstance.stagesAuthenticatorStaticRetrieve(stageUuid)
println(result)
@@ -1615,7 +1985,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
- **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. |
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. |
### Return type
@@ -1648,7 +2018,7 @@ AuthenticatorStaticStage Viewset
//import io.goauthentik.api.models.*
val apiInstance = StagesApi()
-val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage.
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage.
val authenticatorStaticStageRequest : AuthenticatorStaticStageRequest = // AuthenticatorStaticStageRequest |
try {
val result : AuthenticatorStaticStage = apiInstance.stagesAuthenticatorStaticUpdate(stageUuid, authenticatorStaticStageRequest)
@@ -1666,7 +2036,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
- **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. |
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. |
**authenticatorStaticStageRequest** | [**AuthenticatorStaticStageRequest**](AuthenticatorStaticStageRequest.md)| |
### Return type
@@ -1700,7 +2070,7 @@ Get a list of all objects that use this object
//import io.goauthentik.api.models.*
val apiInstance = StagesApi()
-val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Stage.
+val stageUuid : java.util.UUID = 38400000-8cf0-11bd-b23e-10b96e4ef00d // java.util.UUID | A UUID string identifying this Static Authenticator Setup Stage.
try {
val result : kotlin.collections.List = apiInstance.stagesAuthenticatorStaticUsedByList(stageUuid)
println(result)
@@ -1717,7 +2087,7 @@ try {
Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
- **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Stage. |
+ **stageUuid** | **java.util.UUID**| A UUID string identifying this Static Authenticator Setup Stage. |
### Return type
diff --git a/docs/StaticDevice.md b/docs/StaticDevice.md
index 191c94b..edc21d7 100644
--- a/docs/StaticDevice.md
+++ b/docs/StaticDevice.md
@@ -4,9 +4,14 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. |
+**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
+**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
+**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
+**type** | **kotlin.String** | Get type of device | [readonly]
+**confirmed** | **kotlin.Boolean** | | [readonly]
**tokenSet** | [**kotlin.collections.List<StaticDeviceToken>**](StaticDeviceToken.md) | | [readonly]
-**pk** | **kotlin.Int** | | [readonly]
diff --git a/docs/StaticDeviceRequest.md b/docs/StaticDeviceRequest.md
index 3e66347..00b07ad 100644
--- a/docs/StaticDeviceRequest.md
+++ b/docs/StaticDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. |
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
diff --git a/docs/SystemTask.md b/docs/SystemTask.md
new file mode 100644
index 0000000..c36a069
--- /dev/null
+++ b/docs/SystemTask.md
@@ -0,0 +1,19 @@
+
+# SystemTask
+
+## Properties
+Name | Type | Description | Notes
+------------ | ------------- | ------------- | -------------
+**uuid** | [**java.util.UUID**](java.util.UUID.md) | | [readonly]
+**name** | **kotlin.String** | |
+**fullName** | **kotlin.String** | Get full name with UID | [readonly]
+**description** | **kotlin.String** | |
+**startTimestamp** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly]
+**finishTimestamp** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly]
+**duration** | **kotlin.Double** | | [readonly]
+**status** | [**SystemTaskStatusEnum**](SystemTaskStatusEnum.md) | |
+**messages** | **kotlin.collections.List<kotlin.String>** | |
+**uid** | **kotlin.String** | | [optional]
+
+
+
diff --git a/docs/SystemTaskStatusEnum.md b/docs/SystemTaskStatusEnum.md
new file mode 100644
index 0000000..77f1408
--- /dev/null
+++ b/docs/SystemTaskStatusEnum.md
@@ -0,0 +1,18 @@
+
+# SystemTaskStatusEnum
+
+## Enum
+
+
+ * `unknown` (value: `"unknown"`)
+
+ * `successful` (value: `"successful"`)
+
+ * `warning` (value: `"warning"`)
+
+ * `error` (value: `"error"`)
+
+ * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`)
+
+
+
diff --git a/docs/TOTPDevice.md b/docs/TOTPDevice.md
index d985d5a..c96df52 100644
--- a/docs/TOTPDevice.md
+++ b/docs/TOTPDevice.md
@@ -4,8 +4,13 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. |
-**pk** | **kotlin.Int** | | [readonly]
+**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
+**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
+**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
+**type** | **kotlin.String** | Get type of device | [readonly]
+**confirmed** | **kotlin.Boolean** | | [readonly]
diff --git a/docs/TOTPDeviceRequest.md b/docs/TOTPDeviceRequest.md
index 05c9725..b186acb 100644
--- a/docs/TOTPDeviceRequest.md
+++ b/docs/TOTPDeviceRequest.md
@@ -4,7 +4,8 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**name** | **kotlin.String** | The human-readable name of this device. |
+**pk** | **kotlin.String** | |
+**name** | **kotlin.String** | |
diff --git a/docs/Task.md b/docs/Task.md
deleted file mode 100644
index a99d0ad..0000000
--- a/docs/Task.md
+++ /dev/null
@@ -1,15 +0,0 @@
-
-# Task
-
-## Properties
-Name | Type | Description | Notes
------------- | ------------- | ------------- | -------------
-**taskName** | **kotlin.String** | |
-**taskDescription** | **kotlin.String** | |
-**taskFinishTimestamp** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | |
-**taskDuration** | **kotlin.Int** | Get the duration a task took to run | [readonly]
-**status** | [**TaskStatusEnum**](TaskStatusEnum.md) | |
-**messages** | [**kotlin.collections.List<kotlin.Any>**](kotlin.Any.md) | |
-
-
-
diff --git a/docs/TaskStatusEnum.md b/docs/TaskStatusEnum.md
deleted file mode 100644
index aa19fa1..0000000
--- a/docs/TaskStatusEnum.md
+++ /dev/null
@@ -1,18 +0,0 @@
-
-# TaskStatusEnum
-
-## Enum
-
-
- * `sUCCESSFUL` (value: `"SUCCESSFUL"`)
-
- * `wARNING` (value: `"WARNING"`)
-
- * `eRROR` (value: `"ERROR"`)
-
- * `uNKNOWN` (value: `"UNKNOWN"`)
-
- * `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`)
-
-
-
diff --git a/docs/UsedByActionEnum.md b/docs/UsedByActionEnum.md
index fbc9cd4..9c29cf0 100644
--- a/docs/UsedByActionEnum.md
+++ b/docs/UsedByActionEnum.md
@@ -4,13 +4,13 @@
## Enum
- * `cASCADE` (value: `"CASCADE"`)
+ * `cascade` (value: `"cascade"`)
- * `cASCADEMANY` (value: `"CASCADE_MANY"`)
+ * `cascadeMany` (value: `"cascade_many"`)
- * `sETNULL` (value: `"SET_NULL"`)
+ * `setNull` (value: `"set_null"`)
- * `sETDEFAULT` (value: `"SET_DEFAULT"`)
+ * `setDefault` (value: `"set_default"`)
* `unknownDefaultOpenApi` (value: `"unknown_default_open_api"`)
diff --git a/docs/User.md b/docs/User.md
index 529b76a..792e576 100644
--- a/docs/User.md
+++ b/docs/User.md
@@ -9,7 +9,7 @@ Name | Type | Description | Notes
**name** | **kotlin.String** | User's display name. |
**isSuperuser** | **kotlin.Boolean** | | [readonly]
**groupsObj** | [**kotlin.collections.List<UserGroup>**](UserGroup.md) | | [readonly]
-**avatar** | **kotlin.String** | | [readonly]
+**avatar** | **kotlin.String** | User's avatar, either a http/https URL or a data URI | [readonly]
**uid** | **kotlin.String** | | [readonly]
**uuid** | [**java.util.UUID**](java.util.UUID.md) | | [readonly]
**isActive** | **kotlin.Boolean** | Designates whether this user should be treated as active. Unselect this instead of deleting accounts. | [optional]
diff --git a/docs/UserSelf.md b/docs/UserSelf.md
index 948710d..7e17ca5 100644
--- a/docs/UserSelf.md
+++ b/docs/UserSelf.md
@@ -10,7 +10,7 @@ Name | Type | Description | Notes
**isActive** | **kotlin.Boolean** | Designates whether this user should be treated as active. Unselect this instead of deleting accounts. | [readonly]
**isSuperuser** | **kotlin.Boolean** | | [readonly]
**groups** | [**kotlin.collections.List<UserSelfGroups>**](UserSelfGroups.md) | | [readonly]
-**avatar** | **kotlin.String** | | [readonly]
+**avatar** | **kotlin.String** | User's avatar, either a http/https URL or a data URI | [readonly]
**uid** | **kotlin.String** | | [readonly]
**settings** | [**kotlin.collections.Map<kotlin.String, kotlin.Any>**](kotlin.Any.md) | Get user settings with brand and group settings applied | [readonly]
**systemPermissions** | **kotlin.collections.List<kotlin.String>** | Get all system permissions assigned to the user | [readonly]
diff --git a/docs/WebAuthnDevice.md b/docs/WebAuthnDevice.md
index b452311..158e9a0 100644
--- a/docs/WebAuthnDevice.md
+++ b/docs/WebAuthnDevice.md
@@ -4,9 +4,13 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
-**pk** | **kotlin.Int** | | [readonly]
+**verboseName** | **kotlin.String** | Return object's verbose_name | [readonly]
+**verboseNamePlural** | **kotlin.String** | Return object's plural verbose_name | [readonly]
+**metaModelName** | **kotlin.String** | Return internal model name | [readonly]
+**pk** | **kotlin.String** | |
**name** | **kotlin.String** | |
-**createdOn** | [**java.time.OffsetDateTime**](java.time.OffsetDateTime.md) | | [readonly]
+**type** | **kotlin.String** | Get type of device | [readonly]
+**confirmed** | **kotlin.Boolean** | | [readonly]
diff --git a/docs/WebAuthnDeviceRequest.md b/docs/WebAuthnDeviceRequest.md
index b06a52f..89b3a2d 100644
--- a/docs/WebAuthnDeviceRequest.md
+++ b/docs/WebAuthnDeviceRequest.md
@@ -4,6 +4,7 @@
## Properties
Name | Type | Description | Notes
------------ | ------------- | ------------- | -------------
+**pk** | **kotlin.String** | |
**name** | **kotlin.String** | |
diff --git a/schema.yml b/schema.yml
index 0af653c..60f00ff 100644
--- a/schema.yml
+++ b/schema.yml
@@ -1,7 +1,7 @@
openapi: 3.0.3
info:
title: authentik
- version: 2023.10.6
+ version: 2023.10.7
description: Making authentication simple.
contact:
email: hello@goauthentik.io
@@ -236,14 +236,73 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /admin/system_tasks/:
+ /admin/version/:
+ get:
+ operationId: admin_version_retrieve
+ description: Get running and latest version.
+ tags:
+ - admin
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/Version'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /admin/workers/:
get:
- operationId: admin_system_tasks_list
- description: List system tasks
+ operationId: admin_workers_retrieve
+ description: Get currently connected worker count.
tags:
- admin
security:
- authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/Workers'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/admin/all/:
+ get:
+ operationId: authenticators_admin_all_list
+ description: Get all devices for current user
+ parameters:
+ - in: query
+ name: user
+ schema:
+ type: integer
+ tags:
+ - authenticators
+ security:
+ - authentik: []
responses:
'200':
content:
@@ -251,7 +310,7 @@ paths:
schema:
type: array
items:
- $ref: '#/components/schemas/Task'
+ $ref: '#/components/schemas/Device'
description: ''
'400':
content:
@@ -265,18 +324,41 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /admin/system_tasks/{id}/:
+ /authenticators/admin/duo/:
get:
- operationId: admin_system_tasks_retrieve
- description: Get a single system task
+ operationId: authenticators_admin_duo_list
+ description: Viewset for Duo authenticator devices (for admins)
parameters:
- - in: path
- name: id
+ - in: query
+ name: name
+ schema:
+ type: string
+ - name: ordering
+ required: false
+ in: query
+ description: Which field to use when ordering the results.
+ schema:
+ type: string
+ - name: page
+ required: false
+ in: query
+ description: A page number within the paginated result set.
+ schema:
+ type: integer
+ - name: page_size
+ required: false
+ in: query
+ description: Number of results to return per page.
+ schema:
+ type: integer
+ - name: search
+ required: false
+ in: query
+ description: A search term.
schema:
type: string
- required: true
tags:
- - admin
+ - authenticators
security:
- authentik: []
responses:
@@ -284,10 +366,8 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/Task'
+ $ref: '#/components/schemas/PaginatedDuoDeviceList'
description: ''
- '404':
- description: Task not found
'400':
content:
application/json:
@@ -300,27 +380,26 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /admin/system_tasks/{id}/retry/:
post:
- operationId: admin_system_tasks_retry_create
- description: Retry task
- parameters:
- - in: path
- name: id
- schema:
- type: string
- required: true
+ operationId: authenticators_admin_duo_create
+ description: Viewset for Duo authenticator devices (for admins)
tags:
- - admin
+ - authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/DuoDeviceRequest'
+ required: true
security:
- authentik: []
responses:
- '204':
- description: Task retried successfully
- '404':
- description: Task not found
- '500':
- description: Failed to retry task
+ '201':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/DuoDevice'
+ description: ''
'400':
content:
application/json:
@@ -333,12 +412,19 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /admin/version/:
+ /authenticators/admin/duo/{id}/:
get:
- operationId: admin_version_retrieve
- description: Get running and latest version.
+ operationId: authenticators_admin_duo_retrieve
+ description: Viewset for Duo authenticator devices (for admins)
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Duo Device.
+ required: true
tags:
- - admin
+ - authenticators
security:
- authentik: []
responses:
@@ -346,7 +432,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/Version'
+ $ref: '#/components/schemas/DuoDevice'
description: ''
'400':
content:
@@ -360,12 +446,24 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /admin/workers/:
- get:
- operationId: admin_workers_retrieve
- description: Get currently connected worker count.
+ put:
+ operationId: authenticators_admin_duo_update
+ description: Viewset for Duo authenticator devices (for admins)
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Duo Device.
+ required: true
tags:
- - admin
+ - authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/DuoDeviceRequest'
+ required: true
security:
- authentik: []
responses:
@@ -373,7 +471,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/Workers'
+ $ref: '#/components/schemas/DuoDevice'
description: ''
'400':
content:
@@ -387,17 +485,23 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/admin/all/:
- get:
- operationId: authenticators_admin_all_list
- description: Get all devices for current user
+ patch:
+ operationId: authenticators_admin_duo_partial_update
+ description: Viewset for Duo authenticator devices (for admins)
parameters:
- - in: query
- name: user
+ - in: path
+ name: id
schema:
type: integer
+ description: A unique integer value identifying this Duo Device.
+ required: true
tags:
- authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PatchedDuoDeviceRequest'
security:
- authentik: []
responses:
@@ -405,9 +509,7 @@ paths:
content:
application/json:
schema:
- type: array
- items:
- $ref: '#/components/schemas/Device'
+ $ref: '#/components/schemas/DuoDevice'
description: ''
'400':
content:
@@ -421,11 +523,40 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/admin/duo/:
- get:
- operationId: authenticators_admin_duo_list
+ delete:
+ operationId: authenticators_admin_duo_destroy
description: Viewset for Duo authenticator devices (for admins)
parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Duo Device.
+ required: true
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '204':
+ description: No response body
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/admin/mobile/:
+ get:
+ operationId: authenticators_admin_mobile_list
+ description: Viewset for Mobile authenticator devices (for admins)
+ parameters:
- in: query
name: name
schema:
@@ -463,7 +594,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/PaginatedDuoDeviceList'
+ $ref: '#/components/schemas/PaginatedMobileDeviceList'
description: ''
'400':
content:
@@ -478,15 +609,15 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
post:
- operationId: authenticators_admin_duo_create
- description: Viewset for Duo authenticator devices (for admins)
+ operationId: authenticators_admin_mobile_create
+ description: Viewset for Mobile authenticator devices (for admins)
tags:
- authenticators
requestBody:
content:
application/json:
schema:
- $ref: '#/components/schemas/DuoDeviceRequest'
+ $ref: '#/components/schemas/MobileDeviceRequest'
required: true
security:
- authentik: []
@@ -495,7 +626,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/DuoDevice'
+ $ref: '#/components/schemas/MobileDevice'
description: ''
'400':
content:
@@ -509,16 +640,17 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/admin/duo/{id}/:
+ /authenticators/admin/mobile/{uuid}/:
get:
- operationId: authenticators_admin_duo_retrieve
- description: Viewset for Duo authenticator devices (for admins)
+ operationId: authenticators_admin_mobile_retrieve
+ description: Viewset for Mobile authenticator devices (for admins)
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Duo Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -529,7 +661,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/DuoDevice'
+ $ref: '#/components/schemas/MobileDevice'
description: ''
'400':
content:
@@ -544,14 +676,15 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
put:
- operationId: authenticators_admin_duo_update
- description: Viewset for Duo authenticator devices (for admins)
+ operationId: authenticators_admin_mobile_update
+ description: Viewset for Mobile authenticator devices (for admins)
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Duo Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -559,7 +692,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/DuoDeviceRequest'
+ $ref: '#/components/schemas/MobileDeviceRequest'
required: true
security:
- authentik: []
@@ -568,7 +701,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/DuoDevice'
+ $ref: '#/components/schemas/MobileDevice'
description: ''
'400':
content:
@@ -583,14 +716,15 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
patch:
- operationId: authenticators_admin_duo_partial_update
- description: Viewset for Duo authenticator devices (for admins)
+ operationId: authenticators_admin_mobile_partial_update
+ description: Viewset for Mobile authenticator devices (for admins)
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Duo Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -598,7 +732,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/PatchedDuoDeviceRequest'
+ $ref: '#/components/schemas/PatchedMobileDeviceRequest'
security:
- authentik: []
responses:
@@ -606,7 +740,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/DuoDevice'
+ $ref: '#/components/schemas/MobileDevice'
description: ''
'400':
content:
@@ -621,14 +755,15 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
delete:
- operationId: authenticators_admin_duo_destroy
- description: Viewset for Duo authenticator devices (for admins)
+ operationId: authenticators_admin_mobile_destroy
+ description: Viewset for Mobile authenticator devices (for admins)
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Duo Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -1822,10 +1957,10 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/sms/:
+ /authenticators/mobile/:
get:
- operationId: authenticators_sms_list
- description: Viewset for sms authenticator devices
+ operationId: authenticators_mobile_list
+ description: Viewset for Mobile authenticator devices
parameters:
- in: query
name: name
@@ -1864,7 +1999,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/PaginatedSMSDeviceList'
+ $ref: '#/components/schemas/PaginatedMobileDeviceList'
description: ''
'400':
content:
@@ -1878,16 +2013,17 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/sms/{id}/:
+ /authenticators/mobile/{uuid}/:
get:
- operationId: authenticators_sms_retrieve
- description: Viewset for sms authenticator devices
+ operationId: authenticators_mobile_retrieve
+ description: Viewset for Mobile authenticator devices
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this SMS Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -1898,7 +2034,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/SMSDevice'
+ $ref: '#/components/schemas/MobileDevice'
description: ''
'400':
content:
@@ -1913,14 +2049,15 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
put:
- operationId: authenticators_sms_update
- description: Viewset for sms authenticator devices
+ operationId: authenticators_mobile_update
+ description: Viewset for Mobile authenticator devices
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this SMS Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -1928,7 +2065,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/SMSDeviceRequest'
+ $ref: '#/components/schemas/MobileDeviceRequest'
required: true
security:
- authentik: []
@@ -1937,7 +2074,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/SMSDevice'
+ $ref: '#/components/schemas/MobileDevice'
description: ''
'400':
content:
@@ -1952,14 +2089,15 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
patch:
- operationId: authenticators_sms_partial_update
- description: Viewset for sms authenticator devices
+ operationId: authenticators_mobile_partial_update
+ description: Viewset for Mobile authenticator devices
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this SMS Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -1967,7 +2105,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/PatchedSMSDeviceRequest'
+ $ref: '#/components/schemas/PatchedMobileDeviceRequest'
security:
- authentik: []
responses:
@@ -1975,7 +2113,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/SMSDevice'
+ $ref: '#/components/schemas/MobileDevice'
description: ''
'400':
content:
@@ -1990,14 +2128,15 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
delete:
- operationId: authenticators_sms_destroy
- description: Viewset for sms authenticator devices
+ operationId: authenticators_mobile_destroy
+ description: Viewset for Mobile authenticator devices
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this SMS Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -2018,120 +2157,31 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/sms/{id}/used_by/:
- get:
- operationId: authenticators_sms_used_by_list
- description: Get a list of all objects that use this object
+ /authenticators/mobile/{uuid}/check_in/:
+ post:
+ operationId: authenticators_mobile_check_in_create
+ description: Check in data about a device
parameters:
- in: path
- name: id
- schema:
- type: integer
- description: A unique integer value identifying this SMS Device.
- required: true
- tags:
- - authenticators
- security:
- - authentik: []
- responses:
- '200':
- content:
- application/json:
- schema:
- type: array
- items:
- $ref: '#/components/schemas/UsedBy'
- description: ''
- '400':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/ValidationError'
- description: ''
- '403':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/GenericError'
- description: ''
- /authenticators/static/:
- get:
- operationId: authenticators_static_list
- description: Viewset for static authenticator devices
- parameters:
- - in: query
- name: name
- schema:
- type: string
- - name: ordering
- required: false
- in: query
- description: Which field to use when ordering the results.
- schema:
- type: string
- - name: page
- required: false
- in: query
- description: A page number within the paginated result set.
- schema:
- type: integer
- - name: page_size
- required: false
- in: query
- description: Number of results to return per page.
- schema:
- type: integer
- - name: search
- required: false
- in: query
- description: A search term.
+ name: uuid
schema:
type: string
- tags:
- - authenticators
- security:
- - authentik: []
- responses:
- '200':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/PaginatedStaticDeviceList'
- description: ''
- '400':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/ValidationError'
- description: ''
- '403':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/GenericError'
- description: ''
- /authenticators/static/{id}/:
- get:
- operationId: authenticators_static_retrieve
- description: Viewset for static authenticator devices
- parameters:
- - in: path
- name: id
- schema:
- type: integer
- description: A unique integer value identifying this Static Device.
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/MobileDeviceCheckInRequest'
+ required: true
security:
- - authentik: []
+ - mobile_device_token: []
responses:
- '200':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/StaticDevice'
- description: ''
+ '204':
+ description: Checked in
'400':
content:
application/json:
@@ -2144,15 +2194,17 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- put:
- operationId: authenticators_static_update
- description: Viewset for static authenticator devices
+ /authenticators/mobile/{uuid}/enrollment_callback/:
+ post:
+ operationId: authenticators_mobile_enrollment_callback_create
+ description: Enrollment callback
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Static Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -2160,16 +2212,16 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/StaticDeviceRequest'
+ $ref: '#/components/schemas/MobileDeviceEnrollmentRequest'
required: true
security:
- - authentik: []
+ - mobile_device_token: []
responses:
'200':
content:
application/json:
schema:
- $ref: '#/components/schemas/StaticDevice'
+ $ref: '#/components/schemas/MobileDeviceEnrollmentCallback'
description: ''
'400':
content:
@@ -2183,31 +2235,28 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- patch:
- operationId: authenticators_static_partial_update
- description: Viewset for static authenticator devices
+ /authenticators/mobile/{uuid}/enrollment_status/:
+ post:
+ operationId: authenticators_mobile_enrollment_status_create
+ description: Check device enrollment status
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Static Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
- requestBody:
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/PatchedStaticDeviceRequest'
security:
- - authentik: []
+ - mobile_device_token: []
responses:
'200':
content:
application/json:
schema:
- $ref: '#/components/schemas/StaticDevice'
+ $ref: '#/components/schemas/MobileDeviceEnrollmentStatus'
description: ''
'400':
content:
@@ -2221,23 +2270,33 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- delete:
- operationId: authenticators_static_destroy
- description: Viewset for static authenticator devices
+ /authenticators/mobile/{uuid}/receive_response/:
+ post:
+ operationId: authenticators_mobile_receive_response_create
+ description: Get response from notification on phone
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Static Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/MobileDeviceResponseRequest'
+ required: true
security:
- - authentik: []
+ - mobile_device_token: []
responses:
'204':
- description: No response body
+ description: Key successfully set
+ '404':
+ description: Transaction not found
'400':
content:
application/json:
@@ -2250,16 +2309,17 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/static/{id}/used_by/:
+ /authenticators/mobile/{uuid}/used_by/:
get:
- operationId: authenticators_static_used_by_list
+ operationId: authenticators_mobile_used_by_list
description: Get a list of all objects that use this object
parameters:
- in: path
- name: id
+ name: uuid
schema:
- type: integer
- description: A unique integer value identifying this Static Device.
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Device.
required: true
tags:
- authenticators
@@ -2286,10 +2346,10 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/totp/:
+ /authenticators/sms/:
get:
- operationId: authenticators_totp_list
- description: Viewset for totp authenticator devices
+ operationId: authenticators_sms_list
+ description: Viewset for sms authenticator devices
parameters:
- in: query
name: name
@@ -2328,7 +2388,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/PaginatedTOTPDeviceList'
+ $ref: '#/components/schemas/PaginatedSMSDeviceList'
description: ''
'400':
content:
@@ -2342,16 +2402,16 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/totp/{id}/:
+ /authenticators/sms/{id}/:
get:
- operationId: authenticators_totp_retrieve
- description: Viewset for totp authenticator devices
+ operationId: authenticators_sms_retrieve
+ description: Viewset for sms authenticator devices
parameters:
- in: path
name: id
schema:
type: integer
- description: A unique integer value identifying this TOTP Device.
+ description: A unique integer value identifying this SMS Device.
required: true
tags:
- authenticators
@@ -2362,7 +2422,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/TOTPDevice'
+ $ref: '#/components/schemas/SMSDevice'
description: ''
'400':
content:
@@ -2377,14 +2437,14 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
put:
- operationId: authenticators_totp_update
- description: Viewset for totp authenticator devices
+ operationId: authenticators_sms_update
+ description: Viewset for sms authenticator devices
parameters:
- in: path
name: id
schema:
type: integer
- description: A unique integer value identifying this TOTP Device.
+ description: A unique integer value identifying this SMS Device.
required: true
tags:
- authenticators
@@ -2392,7 +2452,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/TOTPDeviceRequest'
+ $ref: '#/components/schemas/SMSDeviceRequest'
required: true
security:
- authentik: []
@@ -2401,7 +2461,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/TOTPDevice'
+ $ref: '#/components/schemas/SMSDevice'
description: ''
'400':
content:
@@ -2416,14 +2476,14 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
patch:
- operationId: authenticators_totp_partial_update
- description: Viewset for totp authenticator devices
+ operationId: authenticators_sms_partial_update
+ description: Viewset for sms authenticator devices
parameters:
- in: path
name: id
schema:
type: integer
- description: A unique integer value identifying this TOTP Device.
+ description: A unique integer value identifying this SMS Device.
required: true
tags:
- authenticators
@@ -2431,7 +2491,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/PatchedTOTPDeviceRequest'
+ $ref: '#/components/schemas/PatchedSMSDeviceRequest'
security:
- authentik: []
responses:
@@ -2439,7 +2499,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/TOTPDevice'
+ $ref: '#/components/schemas/SMSDevice'
description: ''
'400':
content:
@@ -2454,14 +2514,14 @@ paths:
$ref: '#/components/schemas/GenericError'
description: ''
delete:
- operationId: authenticators_totp_destroy
- description: Viewset for totp authenticator devices
+ operationId: authenticators_sms_destroy
+ description: Viewset for sms authenticator devices
parameters:
- in: path
name: id
schema:
type: integer
- description: A unique integer value identifying this TOTP Device.
+ description: A unique integer value identifying this SMS Device.
required: true
tags:
- authenticators
@@ -2482,16 +2542,480 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /authenticators/totp/{id}/used_by/:
+ /authenticators/sms/{id}/used_by/:
get:
- operationId: authenticators_totp_used_by_list
+ operationId: authenticators_sms_used_by_list
description: Get a list of all objects that use this object
parameters:
- in: path
name: id
schema:
type: integer
- description: A unique integer value identifying this TOTP Device.
+ description: A unique integer value identifying this SMS Device.
+ required: true
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ type: array
+ items:
+ $ref: '#/components/schemas/UsedBy'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/static/:
+ get:
+ operationId: authenticators_static_list
+ description: Viewset for static authenticator devices
+ parameters:
+ - in: query
+ name: name
+ schema:
+ type: string
+ - name: ordering
+ required: false
+ in: query
+ description: Which field to use when ordering the results.
+ schema:
+ type: string
+ - name: page
+ required: false
+ in: query
+ description: A page number within the paginated result set.
+ schema:
+ type: integer
+ - name: page_size
+ required: false
+ in: query
+ description: Number of results to return per page.
+ schema:
+ type: integer
+ - name: search
+ required: false
+ in: query
+ description: A search term.
+ schema:
+ type: string
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PaginatedStaticDeviceList'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/static/{id}/:
+ get:
+ operationId: authenticators_static_retrieve
+ description: Viewset for static authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Static Device.
+ required: true
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/StaticDevice'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ put:
+ operationId: authenticators_static_update
+ description: Viewset for static authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Static Device.
+ required: true
+ tags:
+ - authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/StaticDeviceRequest'
+ required: true
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/StaticDevice'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ patch:
+ operationId: authenticators_static_partial_update
+ description: Viewset for static authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Static Device.
+ required: true
+ tags:
+ - authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PatchedStaticDeviceRequest'
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/StaticDevice'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ delete:
+ operationId: authenticators_static_destroy
+ description: Viewset for static authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Static Device.
+ required: true
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '204':
+ description: No response body
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/static/{id}/used_by/:
+ get:
+ operationId: authenticators_static_used_by_list
+ description: Get a list of all objects that use this object
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this Static Device.
+ required: true
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ type: array
+ items:
+ $ref: '#/components/schemas/UsedBy'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/totp/:
+ get:
+ operationId: authenticators_totp_list
+ description: Viewset for totp authenticator devices
+ parameters:
+ - in: query
+ name: name
+ schema:
+ type: string
+ - name: ordering
+ required: false
+ in: query
+ description: Which field to use when ordering the results.
+ schema:
+ type: string
+ - name: page
+ required: false
+ in: query
+ description: A page number within the paginated result set.
+ schema:
+ type: integer
+ - name: page_size
+ required: false
+ in: query
+ description: Number of results to return per page.
+ schema:
+ type: integer
+ - name: search
+ required: false
+ in: query
+ description: A search term.
+ schema:
+ type: string
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PaginatedTOTPDeviceList'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/totp/{id}/:
+ get:
+ operationId: authenticators_totp_retrieve
+ description: Viewset for totp authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this TOTP Device.
+ required: true
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/TOTPDevice'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ put:
+ operationId: authenticators_totp_update
+ description: Viewset for totp authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this TOTP Device.
+ required: true
+ tags:
+ - authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/TOTPDeviceRequest'
+ required: true
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/TOTPDevice'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ patch:
+ operationId: authenticators_totp_partial_update
+ description: Viewset for totp authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this TOTP Device.
+ required: true
+ tags:
+ - authenticators
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PatchedTOTPDeviceRequest'
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/TOTPDevice'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ delete:
+ operationId: authenticators_totp_destroy
+ description: Viewset for totp authenticator devices
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this TOTP Device.
+ required: true
+ tags:
+ - authenticators
+ security:
+ - authentik: []
+ responses:
+ '204':
+ description: No response body
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /authenticators/totp/{id}/used_by/:
+ get:
+ operationId: authenticators_totp_used_by_list
+ description: Get a list of all objects that use this object
+ parameters:
+ - in: path
+ name: id
+ schema:
+ type: integer
+ description: A unique integer value identifying this TOTP Device.
required: true
tags:
- authenticators
@@ -2755,6 +3279,10 @@ paths:
operationId: core_applications_list
description: Custom list method that checks Policy based access instead of guardian
parameters:
+ - in: query
+ name: for_user
+ schema:
+ type: integer
- in: query
name: group
schema:
@@ -3028,8 +3556,6 @@ paths:
schema:
$ref: '#/components/schemas/PolicyTestResult'
description: ''
- '404':
- description: for_user user not found
'400':
content:
application/json:
@@ -3675,6 +4201,7 @@ paths:
tags:
- core
security:
+ - mobile_device_token: []
- authentik: []
- {}
responses:
@@ -5165,6 +5692,7 @@ paths:
tags:
- core
security:
+ - mobile_device_token: []
- authentik: []
responses:
'200':
@@ -6768,128 +7296,308 @@ paths:
schema:
type: string
- in: query
- name: severity
+ name: severity
+ schema:
+ type: string
+ enum:
+ - alert
+ - notice
+ - warning
+ description: |-
+ Controls which severity level the created notifications will have.
+
+ * `notice` - Notice
+ * `warning` - Warning
+ * `alert` - Alert
+ tags:
+ - events
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PaginatedNotificationRuleList'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ post:
+ operationId: events_rules_create
+ description: NotificationRule Viewset
+ tags:
+ - events
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/NotificationRuleRequest'
+ required: true
+ security:
+ - authentik: []
+ responses:
+ '201':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/NotificationRule'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /events/rules/{pbm_uuid}/:
+ get:
+ operationId: events_rules_retrieve
+ description: NotificationRule Viewset
+ parameters:
+ - in: path
+ name: pbm_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Notification Rule.
+ required: true
+ tags:
+ - events
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/NotificationRule'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ put:
+ operationId: events_rules_update
+ description: NotificationRule Viewset
+ parameters:
+ - in: path
+ name: pbm_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Notification Rule.
+ required: true
+ tags:
+ - events
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/NotificationRuleRequest'
+ required: true
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/NotificationRule'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ patch:
+ operationId: events_rules_partial_update
+ description: NotificationRule Viewset
+ parameters:
+ - in: path
+ name: pbm_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Notification Rule.
+ required: true
+ tags:
+ - events
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PatchedNotificationRuleRequest'
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/NotificationRule'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ delete:
+ operationId: events_rules_destroy
+ description: NotificationRule Viewset
+ parameters:
+ - in: path
+ name: pbm_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Notification Rule.
+ required: true
+ tags:
+ - events
+ security:
+ - authentik: []
+ responses:
+ '204':
+ description: No response body
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /events/rules/{pbm_uuid}/used_by/:
+ get:
+ operationId: events_rules_used_by_list
+ description: Get a list of all objects that use this object
+ parameters:
+ - in: path
+ name: pbm_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Notification Rule.
+ required: true
+ tags:
+ - events
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ type: array
+ items:
+ $ref: '#/components/schemas/UsedBy'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /events/system_tasks/:
+ get:
+ operationId: events_system_tasks_list
+ description: Read-only view set that returns all background tasks
+ parameters:
+ - in: query
+ name: name
+ schema:
+ type: string
+ - name: ordering
+ required: false
+ in: query
+ description: Which field to use when ordering the results.
+ schema:
+ type: string
+ - name: page
+ required: false
+ in: query
+ description: A page number within the paginated result set.
+ schema:
+ type: integer
+ - name: page_size
+ required: false
+ in: query
+ description: Number of results to return per page.
+ schema:
+ type: integer
+ - name: search
+ required: false
+ in: query
+ description: A search term.
+ schema:
+ type: string
+ - in: query
+ name: status
schema:
type: string
enum:
- - alert
- - notice
+ - error
+ - successful
+ - unknown
- warning
description: |-
- Controls which severity level the created notifications will have.
-
- * `notice` - Notice
+ * `unknown` - Unknown
+ * `successful` - Successful
* `warning` - Warning
- * `alert` - Alert
- tags:
- - events
- security:
- - authentik: []
- responses:
- '200':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/PaginatedNotificationRuleList'
- description: ''
- '400':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/ValidationError'
- description: ''
- '403':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/GenericError'
- description: ''
- post:
- operationId: events_rules_create
- description: NotificationRule Viewset
- tags:
- - events
- requestBody:
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/NotificationRuleRequest'
- required: true
- security:
- - authentik: []
- responses:
- '201':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/NotificationRule'
- description: ''
- '400':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/ValidationError'
- description: ''
- '403':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/GenericError'
- description: ''
- /events/rules/{pbm_uuid}/:
- get:
- operationId: events_rules_retrieve
- description: NotificationRule Viewset
- parameters:
- - in: path
- name: pbm_uuid
- schema:
- type: string
- format: uuid
- description: A UUID string identifying this Notification Rule.
- required: true
- tags:
- - events
- security:
- - authentik: []
- responses:
- '200':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/NotificationRule'
- description: ''
- '400':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/ValidationError'
- description: ''
- '403':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/GenericError'
- description: ''
- put:
- operationId: events_rules_update
- description: NotificationRule Viewset
- parameters:
- - in: path
- name: pbm_uuid
+ * `error` - Error
+ - in: query
+ name: uid
schema:
type: string
- format: uuid
- description: A UUID string identifying this Notification Rule.
- required: true
tags:
- events
- requestBody:
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/NotificationRuleRequest'
- required: true
security:
- authentik: []
responses:
@@ -6897,7 +7605,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/NotificationRule'
+ $ref: '#/components/schemas/PaginatedSystemTaskList'
description: ''
'400':
content:
@@ -6911,24 +7619,20 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- patch:
- operationId: events_rules_partial_update
- description: NotificationRule Viewset
+ /events/system_tasks/{uuid}/:
+ get:
+ operationId: events_system_tasks_retrieve
+ description: Read-only view set that returns all background tasks
parameters:
- in: path
- name: pbm_uuid
+ name: uuid
schema:
type: string
format: uuid
- description: A UUID string identifying this Notification Rule.
+ description: A UUID string identifying this System Task.
required: true
tags:
- events
- requestBody:
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/PatchedNotificationRuleRequest'
security:
- authentik: []
responses:
@@ -6936,7 +7640,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/NotificationRule'
+ $ref: '#/components/schemas/SystemTask'
description: ''
'400':
content:
@@ -6950,16 +7654,17 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- delete:
- operationId: events_rules_destroy
- description: NotificationRule Viewset
+ /events/system_tasks/{uuid}/run/:
+ post:
+ operationId: events_system_tasks_run_create
+ description: Run task
parameters:
- in: path
- name: pbm_uuid
+ name: uuid
schema:
type: string
format: uuid
- description: A UUID string identifying this Notification Rule.
+ description: A UUID string identifying this System Task.
required: true
tags:
- events
@@ -6967,44 +7672,11 @@ paths:
- authentik: []
responses:
'204':
- description: No response body
- '400':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/ValidationError'
- description: ''
- '403':
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/GenericError'
- description: ''
- /events/rules/{pbm_uuid}/used_by/:
- get:
- operationId: events_rules_used_by_list
- description: Get a list of all objects that use this object
- parameters:
- - in: path
- name: pbm_uuid
- schema:
- type: string
- format: uuid
- description: A UUID string identifying this Notification Rule.
- required: true
- tags:
- - events
- security:
- - authentik: []
- responses:
- '200':
- content:
- application/json:
- schema:
- type: array
- items:
- $ref: '#/components/schemas/UsedBy'
- description: ''
+ description: Task retried successfully
+ '404':
+ description: Task not found
+ '500':
+ description: Failed to retry task
'400':
content:
application/json:
@@ -15995,6 +16667,10 @@ paths:
operationId: providers_oauth2_preview_user_retrieve
description: Preview user data for provider
parameters:
+ - in: query
+ name: for_user
+ schema:
+ type: integer
- in: path
name: id
schema:
@@ -17362,6 +18038,10 @@ paths:
operationId: providers_saml_preview_user_retrieve
description: Preview user data for provider
parameters:
+ - in: query
+ name: for_user
+ schema:
+ type: integer
- in: path
name: id
schema:
@@ -18172,13 +18852,9 @@ paths:
- authentik_policies_expiry.passwordexpirypolicy
- authentik_policies_expression.expressionpolicy
- authentik_policies_password.passwordpolicy
- - authentik_policies_reputation.reputation
- authentik_policies_reputation.reputationpolicy
- authentik_providers_ldap.ldapprovider
- - authentik_providers_oauth2.accesstoken
- - authentik_providers_oauth2.authorizationcode
- authentik_providers_oauth2.oauth2provider
- - authentik_providers_oauth2.refreshtoken
- authentik_providers_oauth2.scopemapping
- authentik_providers_proxy.proxyprovider
- authentik_providers_rac.endpoint
@@ -18200,6 +18876,8 @@ paths:
- authentik_sources_saml.usersamlsourceconnection
- authentik_stages_authenticator_duo.authenticatorduostage
- authentik_stages_authenticator_duo.duodevice
+ - authentik_stages_authenticator_mobile.authenticatormobilestage
+ - authentik_stages_authenticator_mobile.mobiledevice
- authentik_stages_authenticator_sms.authenticatorsmsstage
- authentik_stages_authenticator_sms.smsdevice
- authentik_stages_authenticator_static.authenticatorstaticstage
@@ -18245,14 +18923,10 @@ paths:
* `authentik_policies_expression.expressionpolicy` - Expression Policy
* `authentik_policies_password.passwordpolicy` - Password Policy
* `authentik_policies_reputation.reputationpolicy` - Reputation Policy
- * `authentik_policies_reputation.reputation` - Reputation Score
* `authentik_policies.policybinding` - Policy Binding
* `authentik_providers_ldap.ldapprovider` - LDAP Provider
* `authentik_providers_oauth2.scopemapping` - Scope Mapping
* `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
- * `authentik_providers_oauth2.authorizationcode` - Authorization Code
- * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
- * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
* `authentik_providers_proxy.proxyprovider` - Proxy Provider
* `authentik_providers_radius.radiusprovider` - Radius Provider
* `authentik_providers_saml.samlprovider` - SAML Provider
@@ -18270,9 +18944,11 @@ paths:
* `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
* `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
* `authentik_stages_authenticator_duo.duodevice` - Duo Device
+ * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage
+ * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device
* `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
* `authentik_stages_authenticator_sms.smsdevice` - SMS Device
- * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
+ * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage
* `authentik_stages_authenticator_static.staticdevice` - Static Device
* `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
* `authentik_stages_authenticator_totp.totpdevice` - TOTP Device
@@ -18468,13 +19144,9 @@ paths:
- authentik_policies_expiry.passwordexpirypolicy
- authentik_policies_expression.expressionpolicy
- authentik_policies_password.passwordpolicy
- - authentik_policies_reputation.reputation
- authentik_policies_reputation.reputationpolicy
- authentik_providers_ldap.ldapprovider
- - authentik_providers_oauth2.accesstoken
- - authentik_providers_oauth2.authorizationcode
- authentik_providers_oauth2.oauth2provider
- - authentik_providers_oauth2.refreshtoken
- authentik_providers_oauth2.scopemapping
- authentik_providers_proxy.proxyprovider
- authentik_providers_rac.endpoint
@@ -18496,6 +19168,8 @@ paths:
- authentik_sources_saml.usersamlsourceconnection
- authentik_stages_authenticator_duo.authenticatorduostage
- authentik_stages_authenticator_duo.duodevice
+ - authentik_stages_authenticator_mobile.authenticatormobilestage
+ - authentik_stages_authenticator_mobile.mobiledevice
- authentik_stages_authenticator_sms.authenticatorsmsstage
- authentik_stages_authenticator_sms.smsdevice
- authentik_stages_authenticator_static.authenticatorstaticstage
@@ -18541,14 +19215,10 @@ paths:
* `authentik_policies_expression.expressionpolicy` - Expression Policy
* `authentik_policies_password.passwordpolicy` - Password Policy
* `authentik_policies_reputation.reputationpolicy` - Reputation Policy
- * `authentik_policies_reputation.reputation` - Reputation Score
* `authentik_policies.policybinding` - Policy Binding
* `authentik_providers_ldap.ldapprovider` - LDAP Provider
* `authentik_providers_oauth2.scopemapping` - Scope Mapping
* `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
- * `authentik_providers_oauth2.authorizationcode` - Authorization Code
- * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
- * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
* `authentik_providers_proxy.proxyprovider` - Proxy Provider
* `authentik_providers_radius.radiusprovider` - Radius Provider
* `authentik_providers_saml.samlprovider` - SAML Provider
@@ -18566,9 +19236,11 @@ paths:
* `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
* `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
* `authentik_stages_authenticator_duo.duodevice` - Duo Device
+ * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage
+ * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device
* `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
* `authentik_stages_authenticator_sms.smsdevice` - SMS Device
- * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
+ * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage
* `authentik_stages_authenticator_static.staticdevice` - Static Device
* `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
* `authentik_stages_authenticator_totp.totpdevice` - TOTP Device
@@ -22572,8 +23244,87 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- put:
- operationId: stages_authenticator_duo_update
+ put:
+ operationId: stages_authenticator_duo_update
+ description: AuthenticatorDuoStage Viewset
+ parameters:
+ - in: path
+ name: stage_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Duo Authenticator Setup Stage.
+ required: true
+ tags:
+ - stages
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/AuthenticatorDuoStageRequest'
+ required: true
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/AuthenticatorDuoStage'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ patch:
+ operationId: stages_authenticator_duo_partial_update
+ description: AuthenticatorDuoStage Viewset
+ parameters:
+ - in: path
+ name: stage_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Duo Authenticator Setup Stage.
+ required: true
+ tags:
+ - stages
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PatchedAuthenticatorDuoStageRequest'
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/AuthenticatorDuoStage'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ delete:
+ operationId: stages_authenticator_duo_destroy
description: AuthenticatorDuoStage Viewset
parameters:
- in: path
@@ -22585,12 +23336,37 @@ paths:
required: true
tags:
- stages
- requestBody:
- content:
- application/json:
- schema:
- $ref: '#/components/schemas/AuthenticatorDuoStageRequest'
+ security:
+ - authentik: []
+ responses:
+ '204':
+ description: No response body
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /stages/authenticator/duo/{stage_uuid}/enrollment_status/:
+ post:
+ operationId: stages_authenticator_duo_enrollment_status_create
+ description: Check enrollment status of user details in current session
+ parameters:
+ - in: path
+ name: stage_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Duo Authenticator Setup Stage.
required: true
+ tags:
+ - stages
security:
- authentik: []
responses:
@@ -22598,7 +23374,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/AuthenticatorDuoStage'
+ $ref: '#/components/schemas/DuoDeviceEnrollmentStatus'
description: ''
'400':
content:
@@ -22612,9 +23388,10 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- patch:
- operationId: stages_authenticator_duo_partial_update
- description: AuthenticatorDuoStage Viewset
+ /stages/authenticator/duo/{stage_uuid}/import_device_manual/:
+ post:
+ operationId: stages_authenticator_duo_import_device_manual_create
+ description: Import duo devices into authentik
parameters:
- in: path
name: stage_uuid
@@ -22629,31 +23406,56 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/PatchedAuthenticatorDuoStageRequest'
+ $ref: '#/components/schemas/AuthenticatorDuoStageManualDeviceImportRequest'
+ required: true
security:
- authentik: []
responses:
- '200':
+ '204':
+ description: Enrollment successful
+ '400':
+ description: Bad request
+ '403':
content:
application/json:
schema:
- $ref: '#/components/schemas/AuthenticatorDuoStage'
+ $ref: '#/components/schemas/GenericError'
description: ''
- '400':
+ /stages/authenticator/duo/{stage_uuid}/import_devices_automatic/:
+ post:
+ operationId: stages_authenticator_duo_import_devices_automatic_create
+ description: Import duo devices into authentik
+ parameters:
+ - in: path
+ name: stage_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Duo Authenticator Setup Stage.
+ required: true
+ tags:
+ - stages
+ security:
+ - authentik: []
+ responses:
+ '200':
content:
application/json:
schema:
- $ref: '#/components/schemas/ValidationError'
+ $ref: '#/components/schemas/AuthenticatorDuoStageDeviceImportResponse'
description: ''
+ '400':
+ description: Bad request
'403':
content:
application/json:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- delete:
- operationId: stages_authenticator_duo_destroy
- description: AuthenticatorDuoStage Viewset
+ /stages/authenticator/duo/{stage_uuid}/used_by/:
+ get:
+ operationId: stages_authenticator_duo_used_by_list
+ description: Get a list of all objects that use this object
parameters:
- in: path
name: stage_uuid
@@ -22667,8 +23469,75 @@ paths:
security:
- authentik: []
responses:
- '204':
- description: No response body
+ '200':
+ content:
+ application/json:
+ schema:
+ type: array
+ items:
+ $ref: '#/components/schemas/UsedBy'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /stages/authenticator/mobile/:
+ get:
+ operationId: stages_authenticator_mobile_list
+ description: AuthenticatorMobileStage Viewset
+ parameters:
+ - in: query
+ name: configure_flow
+ schema:
+ type: string
+ format: uuid
+ - in: query
+ name: name
+ schema:
+ type: string
+ - name: ordering
+ required: false
+ in: query
+ description: Which field to use when ordering the results.
+ schema:
+ type: string
+ - name: page
+ required: false
+ in: query
+ description: A page number within the paginated result set.
+ schema:
+ type: integer
+ - name: page_size
+ required: false
+ in: query
+ description: Number of results to return per page.
+ schema:
+ type: integer
+ - name: search
+ required: false
+ in: query
+ description: A search term.
+ schema:
+ type: string
+ tags:
+ - stages
+ security:
+ - authentik: []
+ responses:
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PaginatedAuthenticatorMobileStageList'
+ description: ''
'400':
content:
application/json:
@@ -22681,17 +23550,49 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /stages/authenticator/duo/{stage_uuid}/enrollment_status/:
post:
- operationId: stages_authenticator_duo_enrollment_status_create
- description: Check enrollment status of user details in current session
+ operationId: stages_authenticator_mobile_create
+ description: AuthenticatorMobileStage Viewset
+ tags:
+ - stages
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/AuthenticatorMobileStageRequest'
+ required: true
+ security:
+ - authentik: []
+ responses:
+ '201':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/AuthenticatorMobileStage'
+ description: ''
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /stages/authenticator/mobile/{stage_uuid}/:
+ get:
+ operationId: stages_authenticator_mobile_retrieve
+ description: AuthenticatorMobileStage Viewset
parameters:
- in: path
name: stage_uuid
schema:
type: string
format: uuid
- description: A UUID string identifying this Duo Authenticator Setup Stage.
+ description: A UUID string identifying this Mobile Authenticator Setup Stage.
required: true
tags:
- stages
@@ -22702,7 +23603,7 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/DuoDeviceEnrollmentStatus'
+ $ref: '#/components/schemas/AuthenticatorMobileStage'
description: ''
'400':
content:
@@ -22716,17 +23617,16 @@ paths:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /stages/authenticator/duo/{stage_uuid}/import_device_manual/:
- post:
- operationId: stages_authenticator_duo_import_device_manual_create
- description: Import duo devices into authentik
+ put:
+ operationId: stages_authenticator_mobile_update
+ description: AuthenticatorMobileStage Viewset
parameters:
- in: path
name: stage_uuid
schema:
type: string
format: uuid
- description: A UUID string identifying this Duo Authenticator Setup Stage.
+ description: A UUID string identifying this Mobile Authenticator Setup Stage.
required: true
tags:
- stages
@@ -22734,35 +23634,47 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/AuthenticatorDuoStageManualDeviceImportRequest'
+ $ref: '#/components/schemas/AuthenticatorMobileStageRequest'
required: true
security:
- authentik: []
responses:
- '204':
- description: Enrollment successful
+ '200':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/AuthenticatorMobileStage'
+ description: ''
'400':
- description: Bad request
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
'403':
content:
application/json:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /stages/authenticator/duo/{stage_uuid}/import_devices_automatic/:
- post:
- operationId: stages_authenticator_duo_import_devices_automatic_create
- description: Import duo devices into authentik
+ patch:
+ operationId: stages_authenticator_mobile_partial_update
+ description: AuthenticatorMobileStage Viewset
parameters:
- in: path
name: stage_uuid
schema:
type: string
format: uuid
- description: A UUID string identifying this Duo Authenticator Setup Stage.
+ description: A UUID string identifying this Mobile Authenticator Setup Stage.
required: true
tags:
- stages
+ requestBody:
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/PatchedAuthenticatorMobileStageRequest'
security:
- authentik: []
responses:
@@ -22770,19 +23682,53 @@ paths:
content:
application/json:
schema:
- $ref: '#/components/schemas/AuthenticatorDuoStageDeviceImportResponse'
+ $ref: '#/components/schemas/AuthenticatorMobileStage'
description: ''
'400':
- description: Bad request
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
'403':
content:
application/json:
schema:
$ref: '#/components/schemas/GenericError'
description: ''
- /stages/authenticator/duo/{stage_uuid}/used_by/:
+ delete:
+ operationId: stages_authenticator_mobile_destroy
+ description: AuthenticatorMobileStage Viewset
+ parameters:
+ - in: path
+ name: stage_uuid
+ schema:
+ type: string
+ format: uuid
+ description: A UUID string identifying this Mobile Authenticator Setup Stage.
+ required: true
+ tags:
+ - stages
+ security:
+ - authentik: []
+ responses:
+ '204':
+ description: No response body
+ '400':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/ValidationError'
+ description: ''
+ '403':
+ content:
+ application/json:
+ schema:
+ $ref: '#/components/schemas/GenericError'
+ description: ''
+ /stages/authenticator/mobile/{stage_uuid}/used_by/:
get:
- operationId: stages_authenticator_duo_used_by_list
+ operationId: stages_authenticator_mobile_used_by_list
description: Get a list of all objects that use this object
parameters:
- in: path
@@ -22790,7 +23736,7 @@ paths:
schema:
type: string
format: uuid
- description: A UUID string identifying this Duo Authenticator Setup Stage.
+ description: A UUID string identifying this Mobile Authenticator Setup Stage.
required: true
tags:
- stages
@@ -23265,7 +24211,7 @@ paths:
schema:
type: string
format: uuid
- description: A UUID string identifying this Static Authenticator Stage.
+ description: A UUID string identifying this Static Authenticator Setup Stage.
required: true
tags:
- stages
@@ -23299,7 +24245,7 @@ paths:
schema:
type: string
format: uuid
- description: A UUID string identifying this Static Authenticator Stage.
+ description: A UUID string identifying this Static Authenticator Setup Stage.
required: true
tags:
- stages
@@ -23339,7 +24285,7 @@ paths:
schema:
type: string
format: uuid
- description: A UUID string identifying this Static Authenticator Stage.
+ description: A UUID string identifying this Static Authenticator Setup Stage.
required: true
tags:
- stages
@@ -23378,7 +24324,7 @@ paths:
schema:
type: string
format: uuid
- description: A UUID string identifying this Static Authenticator Stage.
+ description: A UUID string identifying this Static Authenticator Setup Stage.
required: true
tags:
- stages
@@ -23409,7 +24355,7 @@ paths:
schema:
type: string
format: uuid
- description: A UUID string identifying this Static Authenticator Stage.
+ description: A UUID string identifying this Static Authenticator Setup Stage.
required: true
tags:
- stages
@@ -29340,6 +30286,7 @@ components:
- authentik.sources.saml
- authentik.stages.authenticator
- authentik.stages.authenticator_duo
+ - authentik.stages.authenticator_mobile
- authentik.stages.authenticator_sms
- authentik.stages.authenticator_static
- authentik.stages.authenticator_totp
@@ -29394,6 +30341,7 @@ components:
* `authentik.sources.saml` - authentik Sources.SAML
* `authentik.stages.authenticator` - authentik Stages.Authenticator
* `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo
+ * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile
* `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS
* `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static
* `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP
@@ -29654,7 +30602,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
user_verification:
$ref: '#/components/schemas/UserVerificationEnum'
authenticator_attachment:
@@ -29965,7 +30912,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
client_id:
type: string
minLength: 1
@@ -29986,6 +30932,136 @@ components:
- client_id
- client_secret
- name
+ AuthenticatorMobileChallenge:
+ type: object
+ description: Mobile Challenge
+ properties:
+ type:
+ $ref: '#/components/schemas/ChallengeChoices'
+ flow_info:
+ $ref: '#/components/schemas/ContextualFlowInfo'
+ component:
+ type: string
+ default: ak-stage-authenticator-mobile
+ response_errors:
+ type: object
+ additionalProperties:
+ type: array
+ items:
+ $ref: '#/components/schemas/ErrorDetail'
+ pending_user:
+ type: string
+ pending_user_avatar:
+ type: string
+ payload:
+ $ref: '#/components/schemas/AuthenticatorMobilePayloadChallenge'
+ required:
+ - payload
+ - pending_user
+ - pending_user_avatar
+ - type
+ AuthenticatorMobileChallengeResponseRequest:
+ type: object
+ description: Pseudo class for mobile response
+ properties:
+ component:
+ type: string
+ minLength: 1
+ default: ak-stage-authenticator-mobile
+ AuthenticatorMobilePayloadChallenge:
+ type: object
+ description: Payload within the QR code given to the mobile app, hence the short
+ variable names
+ properties:
+ u:
+ type: string
+ description: Server URL
+ s:
+ type: string
+ description: Stage UUID
+ t:
+ type: string
+ description: Initial Token
+ AuthenticatorMobileStage:
+ type: object
+ description: AuthenticatorMobileStage Serializer
+ properties:
+ pk:
+ type: string
+ format: uuid
+ readOnly: true
+ title: Stage uuid
+ name:
+ type: string
+ component:
+ type: string
+ description: Get object type so that we know how to edit the object
+ readOnly: true
+ verbose_name:
+ type: string
+ description: Return object's verbose_name
+ readOnly: true
+ verbose_name_plural:
+ type: string
+ description: Return object's plural verbose_name
+ readOnly: true
+ meta_model_name:
+ type: string
+ description: Return internal model name
+ readOnly: true
+ flow_set:
+ type: array
+ items:
+ $ref: '#/components/schemas/FlowSet'
+ configure_flow:
+ type: string
+ format: uuid
+ nullable: true
+ description: Flow used by an authenticated user to configure this Stage.
+ If empty, user will not be able to configure this stage.
+ friendly_name:
+ type: string
+ nullable: true
+ item_matching_mode:
+ $ref: '#/components/schemas/ItemMatchingModeEnum'
+ cgw_endpoint:
+ type: string
+ required:
+ - cgw_endpoint
+ - component
+ - meta_model_name
+ - name
+ - pk
+ - verbose_name
+ - verbose_name_plural
+ AuthenticatorMobileStageRequest:
+ type: object
+ description: AuthenticatorMobileStage Serializer
+ properties:
+ name:
+ type: string
+ minLength: 1
+ flow_set:
+ type: array
+ items:
+ $ref: '#/components/schemas/FlowSetRequest'
+ configure_flow:
+ type: string
+ format: uuid
+ nullable: true
+ description: Flow used by an authenticated user to configure this Stage.
+ If empty, user will not be able to configure this stage.
+ friendly_name:
+ type: string
+ nullable: true
+ item_matching_mode:
+ $ref: '#/components/schemas/ItemMatchingModeEnum'
+ cgw_endpoint:
+ type: string
+ minLength: 1
+ required:
+ - cgw_endpoint
+ - name
AuthenticatorSMSChallenge:
type: object
description: SMS Setup challenge
@@ -30120,7 +31196,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
provider:
$ref: '#/components/schemas/ProviderEnum'
from_number:
@@ -30265,7 +31340,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
token_count:
type: integer
maximum: 2147483647
@@ -30386,7 +31460,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
digits:
$ref: '#/components/schemas/DigitsEnum'
required:
@@ -30556,6 +31629,9 @@ components:
additionalProperties: {}
duo:
type: integer
+ mobile:
+ type: string
+ minLength: 1
AuthenticatorWebAuthnChallenge:
type: object
description: WebAuthn Challenge
@@ -31128,6 +32204,7 @@ components:
- $ref: '#/components/schemas/AccessDeniedChallenge'
- $ref: '#/components/schemas/AppleLoginChallenge'
- $ref: '#/components/schemas/AuthenticatorDuoChallenge'
+ - $ref: '#/components/schemas/AuthenticatorMobileChallenge'
- $ref: '#/components/schemas/AuthenticatorSMSChallenge'
- $ref: '#/components/schemas/AuthenticatorStaticChallenge'
- $ref: '#/components/schemas/AuthenticatorTOTPChallenge'
@@ -31154,6 +32231,7 @@ components:
ak-stage-access-denied: '#/components/schemas/AccessDeniedChallenge'
ak-source-oauth-apple: '#/components/schemas/AppleLoginChallenge'
ak-stage-authenticator-duo: '#/components/schemas/AuthenticatorDuoChallenge'
+ ak-stage-authenticator-mobile: '#/components/schemas/AuthenticatorMobileChallenge'
ak-stage-authenticator-sms: '#/components/schemas/AuthenticatorSMSChallenge'
ak-stage-authenticator-static: '#/components/schemas/AuthenticatorStaticChallenge'
ak-stage-authenticator-totp: '#/components/schemas/AuthenticatorTOTPChallenge'
@@ -31514,7 +32592,7 @@ components:
description: Return internal model name
readOnly: true
pk:
- type: integer
+ type: string
name:
type: string
type:
@@ -31523,6 +32601,7 @@ components:
readOnly: true
confirmed:
type: boolean
+ readOnly: true
required:
- confirmed
- meta_model_name
@@ -31570,6 +32649,7 @@ components:
- webauthn
- duo
- sms
+ - mobile
type: string
description: |-
* `static` - Static
@@ -31577,6 +32657,7 @@ components:
* `webauthn` - WebAuthn
* `duo` - Duo
* `sms` - SMS
+ * `mobile` - authentik Mobile
DigestAlgorithmEnum:
enum:
- http://www.w3.org/2000/09/xmldsig#sha1
@@ -31881,17 +32962,37 @@ components:
type: object
description: Serializer for Duo authenticator devices
properties:
- pk:
- type: integer
+ verbose_name:
+ type: string
+ description: Return object's verbose_name
readOnly: true
- title: ID
+ verbose_name_plural:
+ type: string
+ description: Return object's plural verbose_name
+ readOnly: true
+ meta_model_name:
+ type: string
+ description: Return internal model name
+ readOnly: true
+ pk:
+ type: string
name:
type: string
- description: The human-readable name of this device.
- maxLength: 64
+ type:
+ type: string
+ description: Get type of device
+ readOnly: true
+ confirmed:
+ type: boolean
+ readOnly: true
required:
+ - confirmed
+ - meta_model_name
- name
- pk
+ - type
+ - verbose_name
+ - verbose_name_plural
DuoDeviceEnrollmentStatus:
type: object
properties:
@@ -31903,13 +33004,15 @@ components:
type: object
description: Serializer for Duo authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
required:
- name
+ - pk
DuoResponseEnum:
enum:
- success
@@ -32395,6 +33498,7 @@ components:
* `authentik.sources.saml` - authentik Sources.SAML
* `authentik.stages.authenticator` - authentik Stages.Authenticator
* `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo
+ * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile
* `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS
* `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static
* `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP
@@ -32444,14 +33548,10 @@ components:
* `authentik_policies_expression.expressionpolicy` - Expression Policy
* `authentik_policies_password.passwordpolicy` - Password Policy
* `authentik_policies_reputation.reputationpolicy` - Reputation Policy
- * `authentik_policies_reputation.reputation` - Reputation Score
* `authentik_policies.policybinding` - Policy Binding
* `authentik_providers_ldap.ldapprovider` - LDAP Provider
* `authentik_providers_oauth2.scopemapping` - Scope Mapping
* `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
- * `authentik_providers_oauth2.authorizationcode` - Authorization Code
- * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
- * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
* `authentik_providers_proxy.proxyprovider` - Proxy Provider
* `authentik_providers_radius.radiusprovider` - Radius Provider
* `authentik_providers_saml.samlprovider` - SAML Provider
@@ -32469,9 +33569,11 @@ components:
* `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
* `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
* `authentik_stages_authenticator_duo.duodevice` - Duo Device
+ * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage
+ * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device
* `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
* `authentik_stages_authenticator_sms.smsdevice` - SMS Device
- * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
+ * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage
* `authentik_stages_authenticator_static.staticdevice` - Static Device
* `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
* `authentik_stages_authenticator_totp.totpdevice` - TOTP Device
@@ -32598,6 +33700,7 @@ components:
* `authentik.sources.saml` - authentik Sources.SAML
* `authentik.stages.authenticator` - authentik Stages.Authenticator
* `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo
+ * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile
* `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS
* `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static
* `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP
@@ -32647,14 +33750,10 @@ components:
* `authentik_policies_expression.expressionpolicy` - Expression Policy
* `authentik_policies_password.passwordpolicy` - Password Policy
* `authentik_policies_reputation.reputationpolicy` - Reputation Policy
- * `authentik_policies_reputation.reputation` - Reputation Score
* `authentik_policies.policybinding` - Policy Binding
* `authentik_providers_ldap.ldapprovider` - LDAP Provider
* `authentik_providers_oauth2.scopemapping` - Scope Mapping
* `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
- * `authentik_providers_oauth2.authorizationcode` - Authorization Code
- * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
- * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
* `authentik_providers_proxy.proxyprovider` - Proxy Provider
* `authentik_providers_radius.radiusprovider` - Radius Provider
* `authentik_providers_saml.samlprovider` - SAML Provider
@@ -32672,9 +33771,11 @@ components:
* `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
* `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
* `authentik_stages_authenticator_duo.duodevice` - Duo Device
+ * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage
+ * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device
* `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
* `authentik_stages_authenticator_sms.smsdevice` - SMS Device
- * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
+ * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage
* `authentik_stages_authenticator_static.staticdevice` - Static Device
* `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
* `authentik_stages_authenticator_totp.totpdevice` - TOTP Device
@@ -33063,6 +34164,7 @@ components:
oneOf:
- $ref: '#/components/schemas/AppleChallengeResponseRequest'
- $ref: '#/components/schemas/AuthenticatorDuoChallengeResponseRequest'
+ - $ref: '#/components/schemas/AuthenticatorMobileChallengeResponseRequest'
- $ref: '#/components/schemas/AuthenticatorSMSChallengeResponseRequest'
- $ref: '#/components/schemas/AuthenticatorStaticChallengeResponseRequest'
- $ref: '#/components/schemas/AuthenticatorTOTPChallengeResponseRequest'
@@ -33085,6 +34187,7 @@ components:
mapping:
ak-source-oauth-apple: '#/components/schemas/AppleChallengeResponseRequest'
ak-stage-authenticator-duo: '#/components/schemas/AuthenticatorDuoChallengeResponseRequest'
+ ak-stage-authenticator-mobile: '#/components/schemas/AuthenticatorMobileChallengeResponseRequest'
ak-stage-authenticator-sms: '#/components/schemas/AuthenticatorSMSChallengeResponseRequest'
ak-stage-authenticator-static: '#/components/schemas/AuthenticatorStaticChallengeResponseRequest'
ak-stage-authenticator-totp: '#/components/schemas/AuthenticatorTOTPChallengeResponseRequest'
@@ -34073,6 +35176,16 @@ components:
description: |-
* `global` - Same identifier is used for all providers
* `per_provider` - Each provider has a different issuer, based on the application slug.
+ ItemMatchingModeEnum:
+ enum:
+ - accept_deny
+ - number_matching_2
+ - number_matching_3
+ type: string
+ description: |-
+ * `accept_deny` - Accept Deny
+ * `number_matching_2` - Number Matching 2
+ * `number_matching_3` - Number Matching 3
KubernetesServiceConnection:
type: object
description: KubernetesServiceConnection Serializer
@@ -34787,7 +35900,7 @@ components:
tasks:
type: array
items:
- $ref: '#/components/schemas/Task'
+ $ref: '#/components/schemas/SystemTask'
readOnly: true
required:
- is_running
@@ -34946,6 +36059,173 @@ components:
required:
- labels
- name
+ MobileDevice:
+ type: object
+ description: Serializer for Mobile authenticator devices
+ properties:
+ verbose_name:
+ type: string
+ description: Return object's verbose_name
+ readOnly: true
+ verbose_name_plural:
+ type: string
+ description: Return object's plural verbose_name
+ readOnly: true
+ meta_model_name:
+ type: string
+ description: Return internal model name
+ readOnly: true
+ pk:
+ type: string
+ name:
+ type: string
+ type:
+ type: string
+ description: Get type of device
+ readOnly: true
+ confirmed:
+ type: boolean
+ readOnly: true
+ state:
+ allOf:
+ - $ref: '#/components/schemas/MobileDeviceInfo'
+ readOnly: true
+ last_checkin:
+ type: string
+ format: date-time
+ readOnly: true
+ required:
+ - confirmed
+ - last_checkin
+ - meta_model_name
+ - name
+ - pk
+ - state
+ - type
+ - verbose_name
+ - verbose_name_plural
+ MobileDeviceCheckInRequest:
+ type: object
+ description: Check info into authentik
+ properties:
+ firebase_key:
+ type: string
+ minLength: 1
+ info:
+ $ref: '#/components/schemas/MobileDeviceInfoRequest'
+ required:
+ - info
+ MobileDeviceEnrollmentCallback:
+ type: object
+ properties:
+ token:
+ type: string
+ required:
+ - token
+ MobileDeviceEnrollmentRequest:
+ type: object
+ description: Enrollment request, send the device's unique identifier
+ properties:
+ firebase_key:
+ type: string
+ minLength: 1
+ device_uid:
+ type: string
+ minLength: 1
+ info:
+ $ref: '#/components/schemas/MobileDeviceInfoRequest'
+ required:
+ - device_uid
+ - info
+ MobileDeviceEnrollmentStatus:
+ type: object
+ properties:
+ status:
+ $ref: '#/components/schemas/MobileDeviceEnrollmentStatusStatusEnum'
+ required:
+ - status
+ MobileDeviceEnrollmentStatusStatusEnum:
+ enum:
+ - success
+ - waiting
+ type: string
+ description: |-
+ * `success` - Success
+ * `waiting` - Waiting
+ MobileDeviceInfo:
+ type: object
+ description: Info about a mobile device
+ properties:
+ platform:
+ $ref: '#/components/schemas/PlatformEnum'
+ os_version:
+ type: string
+ model:
+ type: string
+ hostname:
+ type: string
+ app_version:
+ type: string
+ others: {}
+ required:
+ - app_version
+ - hostname
+ - model
+ - os_version
+ - others
+ - platform
+ MobileDeviceInfoRequest:
+ type: object
+ description: Info about a mobile device
+ properties:
+ platform:
+ $ref: '#/components/schemas/PlatformEnum'
+ os_version:
+ type: string
+ minLength: 1
+ model:
+ type: string
+ minLength: 1
+ hostname:
+ type: string
+ minLength: 1
+ app_version:
+ type: string
+ minLength: 1
+ others: {}
+ required:
+ - app_version
+ - hostname
+ - model
+ - os_version
+ - others
+ - platform
+ MobileDeviceRequest:
+ type: object
+ description: Serializer for Mobile authenticator devices
+ properties:
+ pk:
+ type: string
+ minLength: 1
+ name:
+ type: string
+ minLength: 1
+ required:
+ - name
+ - pk
+ MobileDeviceResponseRequest:
+ type: object
+ description: Response from push sent to phone
+ properties:
+ tx_id:
+ type: string
+ format: uuid
+ selected_item:
+ type: string
+ minLength: 1
+ required:
+ - selected_item
+ - tx_id
ModelEnum:
enum:
- authentik_tenants.domain
@@ -34966,14 +36246,10 @@ components:
- authentik_policies_expression.expressionpolicy
- authentik_policies_password.passwordpolicy
- authentik_policies_reputation.reputationpolicy
- - authentik_policies_reputation.reputation
- authentik_policies.policybinding
- authentik_providers_ldap.ldapprovider
- authentik_providers_oauth2.scopemapping
- authentik_providers_oauth2.oauth2provider
- - authentik_providers_oauth2.authorizationcode
- - authentik_providers_oauth2.accesstoken
- - authentik_providers_oauth2.refreshtoken
- authentik_providers_proxy.proxyprovider
- authentik_providers_radius.radiusprovider
- authentik_providers_saml.samlprovider
@@ -34991,6 +36267,8 @@ components:
- authentik_sources_saml.usersamlsourceconnection
- authentik_stages_authenticator_duo.authenticatorduostage
- authentik_stages_authenticator_duo.duodevice
+ - authentik_stages_authenticator_mobile.authenticatormobilestage
+ - authentik_stages_authenticator_mobile.mobiledevice
- authentik_stages_authenticator_sms.authenticatorsmsstage
- authentik_stages_authenticator_sms.smsdevice
- authentik_stages_authenticator_static.authenticatorstaticstage
@@ -35046,14 +36324,10 @@ components:
* `authentik_policies_expression.expressionpolicy` - Expression Policy
* `authentik_policies_password.passwordpolicy` - Password Policy
* `authentik_policies_reputation.reputationpolicy` - Reputation Policy
- * `authentik_policies_reputation.reputation` - Reputation Score
* `authentik_policies.policybinding` - Policy Binding
* `authentik_providers_ldap.ldapprovider` - LDAP Provider
* `authentik_providers_oauth2.scopemapping` - Scope Mapping
* `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
- * `authentik_providers_oauth2.authorizationcode` - Authorization Code
- * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
- * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
* `authentik_providers_proxy.proxyprovider` - Proxy Provider
* `authentik_providers_radius.radiusprovider` - Radius Provider
* `authentik_providers_saml.samlprovider` - SAML Provider
@@ -35071,9 +36345,11 @@ components:
* `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
* `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
* `authentik_stages_authenticator_duo.duodevice` - Duo Device
+ * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage
+ * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device
* `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
* `authentik_stages_authenticator_sms.smsdevice` - SMS Device
- * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
+ * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage
* `authentik_stages_authenticator_static.staticdevice` - Static Device
* `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
* `authentik_stages_authenticator_totp.totpdevice` - TOTP Device
@@ -36147,6 +37423,18 @@ components:
required:
- pagination
- results
+ PaginatedAuthenticatorMobileStageList:
+ type: object
+ properties:
+ pagination:
+ $ref: '#/components/schemas/Pagination'
+ results:
+ type: array
+ items:
+ $ref: '#/components/schemas/AuthenticatorMobileStage'
+ required:
+ - pagination
+ - results
PaginatedAuthenticatorSMSStageList:
type: object
properties:
@@ -36567,6 +37855,18 @@ components:
required:
- pagination
- results
+ PaginatedMobileDeviceList:
+ type: object
+ properties:
+ pagination:
+ $ref: '#/components/schemas/Pagination'
+ results:
+ type: array
+ items:
+ $ref: '#/components/schemas/MobileDevice'
+ required:
+ - pagination
+ - results
PaginatedNotificationList:
type: object
properties:
@@ -37047,6 +38347,18 @@ components:
required:
- pagination
- results
+ PaginatedSystemTaskList:
+ type: object
+ properties:
+ pagination:
+ $ref: '#/components/schemas/Pagination'
+ results:
+ type: array
+ items:
+ $ref: '#/components/schemas/SystemTask'
+ required:
+ - pagination
+ - results
PaginatedTOTPDeviceList:
type: object
properties:
@@ -37652,7 +38964,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
user_verification:
$ref: '#/components/schemas/UserVerificationEnum'
authenticator_attachment:
@@ -37681,7 +38992,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
client_id:
type: string
minLength: 1
@@ -37697,6 +39007,31 @@ components:
admin_secret_key:
type: string
writeOnly: true
+ PatchedAuthenticatorMobileStageRequest:
+ type: object
+ description: AuthenticatorMobileStage Serializer
+ properties:
+ name:
+ type: string
+ minLength: 1
+ flow_set:
+ type: array
+ items:
+ $ref: '#/components/schemas/FlowSetRequest'
+ configure_flow:
+ type: string
+ format: uuid
+ nullable: true
+ description: Flow used by an authenticated user to configure this Stage.
+ If empty, user will not be able to configure this stage.
+ friendly_name:
+ type: string
+ nullable: true
+ item_matching_mode:
+ $ref: '#/components/schemas/ItemMatchingModeEnum'
+ cgw_endpoint:
+ type: string
+ minLength: 1
PatchedAuthenticatorSMSStageRequest:
type: object
description: AuthenticatorSMSStage Serializer
@@ -37717,7 +39052,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
provider:
$ref: '#/components/schemas/ProviderEnum'
from_number:
@@ -37763,7 +39097,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
token_count:
type: integer
maximum: 2147483647
@@ -37792,7 +39125,6 @@ components:
friendly_name:
type: string
nullable: true
- minLength: 1
digits:
$ref: '#/components/schemas/DigitsEnum'
PatchedAuthenticatorValidateStageRequest:
@@ -38054,11 +39386,12 @@ components:
type: object
description: Serializer for Duo authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
PatchedEmailStageRequest:
type: object
description: EmailStage Serializer
@@ -38225,6 +39558,7 @@ components:
* `authentik.sources.saml` - authentik Sources.SAML
* `authentik.stages.authenticator` - authentik Stages.Authenticator
* `authentik.stages.authenticator_duo` - authentik Stages.Authenticator.Duo
+ * `authentik.stages.authenticator_mobile` - authentik Stages.Authenticator.Mobile
* `authentik.stages.authenticator_sms` - authentik Stages.Authenticator.SMS
* `authentik.stages.authenticator_static` - authentik Stages.Authenticator.Static
* `authentik.stages.authenticator_totp` - authentik Stages.Authenticator.TOTP
@@ -38274,14 +39608,10 @@ components:
* `authentik_policies_expression.expressionpolicy` - Expression Policy
* `authentik_policies_password.passwordpolicy` - Password Policy
* `authentik_policies_reputation.reputationpolicy` - Reputation Policy
- * `authentik_policies_reputation.reputation` - Reputation Score
* `authentik_policies.policybinding` - Policy Binding
* `authentik_providers_ldap.ldapprovider` - LDAP Provider
* `authentik_providers_oauth2.scopemapping` - Scope Mapping
* `authentik_providers_oauth2.oauth2provider` - OAuth2/OpenID Provider
- * `authentik_providers_oauth2.authorizationcode` - Authorization Code
- * `authentik_providers_oauth2.accesstoken` - OAuth2 Access Token
- * `authentik_providers_oauth2.refreshtoken` - OAuth2 Refresh Token
* `authentik_providers_proxy.proxyprovider` - Proxy Provider
* `authentik_providers_radius.radiusprovider` - Radius Provider
* `authentik_providers_saml.samlprovider` - SAML Provider
@@ -38299,9 +39629,11 @@ components:
* `authentik_sources_saml.usersamlsourceconnection` - User SAML Source Connection
* `authentik_stages_authenticator_duo.authenticatorduostage` - Duo Authenticator Setup Stage
* `authentik_stages_authenticator_duo.duodevice` - Duo Device
+ * `authentik_stages_authenticator_mobile.authenticatormobilestage` - Mobile Authenticator Setup Stage
+ * `authentik_stages_authenticator_mobile.mobiledevice` - Mobile Device
* `authentik_stages_authenticator_sms.authenticatorsmsstage` - SMS Authenticator Setup Stage
* `authentik_stages_authenticator_sms.smsdevice` - SMS Device
- * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Stage
+ * `authentik_stages_authenticator_static.authenticatorstaticstage` - Static Authenticator Setup Stage
* `authentik_stages_authenticator_static.staticdevice` - Static Device
* `authentik_stages_authenticator_totp.authenticatortotpstage` - TOTP Authenticator Setup Stage
* `authentik_stages_authenticator_totp.totpdevice` - TOTP Device
@@ -38812,6 +40144,16 @@ components:
key:
type: string
minLength: 1
+ PatchedMobileDeviceRequest:
+ type: object
+ description: Serializer for Mobile authenticator devices
+ properties:
+ pk:
+ type: string
+ minLength: 1
+ name:
+ type: string
+ minLength: 1
PatchedNotificationRequest:
type: object
description: Notification Serializer
@@ -39845,11 +41187,12 @@ components:
type: object
description: Serializer for sms authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
PatchedScopeMappingRequest:
type: object
description: ScopeMapping Serializer
@@ -39912,20 +41255,22 @@ components:
type: object
description: Serializer for static authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
PatchedTOTPDeviceRequest:
type: object
description: Serializer for totp authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
PatchedTenantRequest:
type: object
description: Tenant Serializer
@@ -40125,10 +41470,12 @@ components:
type: object
description: Serializer for WebAuthn authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- maxLength: 200
Permission:
type: object
description: Global permission
@@ -40181,6 +41528,16 @@ components:
minLength: 1
required:
- permissions
+ PlatformEnum:
+ enum:
+ - ios
+ - android
+ - other
+ type: string
+ description: |-
+ * `ios` - iOS
+ * `android` - Android
+ * `other` - Other
PlexAuthenticationChallenge:
type: object
description: Challenge shown to the user in identification stage
@@ -42794,7 +44151,7 @@ components:
tasks:
type: array
items:
- $ref: '#/components/schemas/Task'
+ $ref: '#/components/schemas/SystemTask'
readOnly: true
required:
- is_running
@@ -42803,32 +44160,50 @@ components:
type: object
description: Serializer for sms authenticator devices
properties:
- name:
+ verbose_name:
type: string
- description: The human-readable name of this device.
- maxLength: 64
- pk:
- type: integer
+ description: Return object's verbose_name
readOnly: true
- title: ID
- phone_number:
+ verbose_name_plural:
type: string
+ description: Return object's plural verbose_name
+ readOnly: true
+ meta_model_name:
+ type: string
+ description: Return internal model name
+ readOnly: true
+ pk:
+ type: string
+ name:
+ type: string
+ type:
+ type: string
+ description: Get type of device
+ readOnly: true
+ confirmed:
+ type: boolean
readOnly: true
required:
+ - confirmed
+ - meta_model_name
- name
- - phone_number
- pk
+ - type
+ - verbose_name
+ - verbose_name_plural
SMSDeviceRequest:
type: object
description: Serializer for sms authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
required:
- name
+ - pk
ScopeMapping:
type: object
description: ScopeMapping Serializer
@@ -43386,34 +44761,56 @@ components:
type: object
description: Serializer for static authenticator devices
properties:
+ verbose_name:
+ type: string
+ description: Return object's verbose_name
+ readOnly: true
+ verbose_name_plural:
+ type: string
+ description: Return object's plural verbose_name
+ readOnly: true
+ meta_model_name:
+ type: string
+ description: Return internal model name
+ readOnly: true
+ pk:
+ type: string
name:
type: string
- description: The human-readable name of this device.
- maxLength: 64
+ type:
+ type: string
+ description: Get type of device
+ readOnly: true
+ confirmed:
+ type: boolean
+ readOnly: true
token_set:
type: array
items:
$ref: '#/components/schemas/StaticDeviceToken'
readOnly: true
- pk:
- type: integer
- readOnly: true
- title: ID
required:
+ - confirmed
+ - meta_model_name
- name
- pk
- token_set
+ - type
+ - verbose_name
+ - verbose_name_plural
StaticDeviceRequest:
type: object
description: Serializer for static authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
required:
- name
+ - pk
StaticDeviceToken:
type: object
description: Serializer for static device's tokens
@@ -43517,71 +44914,112 @@ components:
- http_is_secure
- runtime
- server_time
- TOTPDevice:
+ SystemTask:
type: object
- description: Serializer for totp authenticator devices
+ description: Serialize TaskInfo and TaskResult
properties:
- name:
+ uuid:
type: string
- description: The human-readable name of this device.
- maxLength: 64
- pk:
- type: integer
+ format: uuid
readOnly: true
- title: ID
- required:
- - name
- - pk
- TOTPDeviceRequest:
- type: object
- description: Serializer for totp authenticator devices
- properties:
name:
type: string
- minLength: 1
- description: The human-readable name of this device.
- maxLength: 64
- required:
- - name
- Task:
- type: object
- description: Serialize TaskInfo and TaskResult
- properties:
- task_name:
+ full_name:
+ type: string
+ description: Get full name with UID
+ readOnly: true
+ uid:
type: string
- task_description:
+ description:
type: string
- task_finish_timestamp:
+ start_timestamp:
type: string
format: date-time
- task_duration:
- type: integer
- description: Get the duration a task took to run
+ readOnly: true
+ finish_timestamp:
+ type: string
+ format: date-time
+ readOnly: true
+ duration:
+ type: number
+ format: double
readOnly: true
status:
- $ref: '#/components/schemas/TaskStatusEnum'
+ $ref: '#/components/schemas/SystemTaskStatusEnum'
messages:
type: array
- items: {}
+ items:
+ type: string
required:
+ - description
+ - duration
+ - finish_timestamp
+ - full_name
- messages
+ - name
+ - start_timestamp
- status
- - task_description
- - task_duration
- - task_finish_timestamp
- - task_name
- TaskStatusEnum:
+ - uuid
+ SystemTaskStatusEnum:
enum:
- - SUCCESSFUL
- - WARNING
- - ERROR
- - UNKNOWN
+ - unknown
+ - successful
+ - warning
+ - error
type: string
description: |-
- * `SUCCESSFUL` - SUCCESSFUL
- * `WARNING` - WARNING
- * `ERROR` - ERROR
- * `UNKNOWN` - UNKNOWN
+ * `unknown` - UNKNOWN
+ * `successful` - SUCCESSFUL
+ * `warning` - WARNING
+ * `error` - ERROR
+ TOTPDevice:
+ type: object
+ description: Serializer for totp authenticator devices
+ properties:
+ verbose_name:
+ type: string
+ description: Return object's verbose_name
+ readOnly: true
+ verbose_name_plural:
+ type: string
+ description: Return object's plural verbose_name
+ readOnly: true
+ meta_model_name:
+ type: string
+ description: Return internal model name
+ readOnly: true
+ pk:
+ type: string
+ name:
+ type: string
+ type:
+ type: string
+ description: Get type of device
+ readOnly: true
+ confirmed:
+ type: boolean
+ readOnly: true
+ required:
+ - confirmed
+ - meta_model_name
+ - name
+ - pk
+ - type
+ - verbose_name
+ - verbose_name_plural
+ TOTPDeviceRequest:
+ type: object
+ description: Serializer for totp authenticator devices
+ properties:
+ pk:
+ type: string
+ minLength: 1
+ name:
+ type: string
+ minLength: 1
+ required:
+ - name
+ - pk
Tenant:
type: object
description: Tenant Serializer
@@ -43853,16 +45291,16 @@ components:
- pk
UsedByActionEnum:
enum:
- - CASCADE
- - CASCADE_MANY
- - SET_NULL
- - SET_DEFAULT
+ - cascade
+ - cascade_many
+ - set_null
+ - set_default
type: string
description: |-
- * `CASCADE` - CASCADE
- * `CASCADE_MANY` - CASCADE_MANY
- * `SET_NULL` - SET_NULL
- * `SET_DEFAULT` - SET_DEFAULT
+ * `cascade` - CASCADE
+ * `cascade_many` - CASCADE_MANY
+ * `set_null` - SET_NULL
+ * `set_default` - SET_DEFAULT
User:
type: object
description: User Serializer
@@ -43906,6 +45344,7 @@ components:
maxLength: 254
avatar:
type: string
+ description: User's avatar, either a http/https URL or a data URI
readOnly: true
attributes:
type: object
@@ -44577,6 +46016,7 @@ components:
maxLength: 254
avatar:
type: string
+ description: User's avatar, either a http/https URL or a data URI
readOnly: true
uid:
type: string
@@ -44836,31 +46276,50 @@ components:
type: object
description: Serializer for WebAuthn authenticator devices
properties:
- pk:
- type: integer
+ verbose_name:
+ type: string
+ description: Return object's verbose_name
readOnly: true
- title: ID
+ verbose_name_plural:
+ type: string
+ description: Return object's plural verbose_name
+ readOnly: true
+ meta_model_name:
+ type: string
+ description: Return internal model name
+ readOnly: true
+ pk:
+ type: string
name:
type: string
- maxLength: 200
- created_on:
+ type:
type: string
- format: date-time
+ description: Get type of device
+ readOnly: true
+ confirmed:
+ type: boolean
readOnly: true
required:
- - created_on
+ - confirmed
+ - meta_model_name
- name
- pk
+ - type
+ - verbose_name
+ - verbose_name_plural
WebAuthnDeviceRequest:
type: object
description: Serializer for WebAuthn authenticator devices
properties:
+ pk:
+ type: string
+ minLength: 1
name:
type: string
minLength: 1
- maxLength: 200
required:
- name
+ - pk
Workers:
type: object
properties:
@@ -44893,5 +46352,10 @@ components:
in: header
name: Authorization
scheme: bearer
+ mobile_device_token:
+ type: apiKey
+ in: header
+ name: Authorization
+ scheme: bearer
servers:
- url: /api/v3/
diff --git a/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt b/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt
index 93c4ac4..91cd394 100644
--- a/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt
+++ b/src/main/kotlin/io/goauthentik/api/apis/AdminApi.kt
@@ -26,7 +26,6 @@ import io.goauthentik.api.models.PatchedSettingsRequest
import io.goauthentik.api.models.Settings
import io.goauthentik.api.models.SettingsRequest
import io.goauthentik.api.models.SystemInfo
-import io.goauthentik.api.models.Task
import io.goauthentik.api.models.ValidationError
import io.goauthentik.api.models.Version
import io.goauthentik.api.models.Workers
@@ -607,214 +606,6 @@ class AdminApi(basePath: kotlin.String = defaultBasePath, client: OkHttpClient =
)
}
- /**
- *
- * List system tasks
- * @return kotlin.collections.List
- * @throws IllegalStateException If the request is not correctly configured
- * @throws IOException Rethrows the OkHttp execute method exception
- * @throws UnsupportedOperationException If the API returns an informational or redirection response
- * @throws ClientException If the API returns a client error response
- * @throws ServerException If the API returns a server error response
- */
- @Suppress("UNCHECKED_CAST")
- @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun adminSystemTasksList() : kotlin.collections.List {
- val localVarResponse = adminSystemTasksListWithHttpInfo()
-
- return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List
- ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
- ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
- ResponseType.ClientError -> {
- val localVarError = localVarResponse as ClientError<*>
- throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
- }
- ResponseType.ServerError -> {
- val localVarError = localVarResponse as ServerError<*>
- throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
- }
- }
- }
-
- /**
- *
- * List system tasks
- * @return ApiResponse?>
- * @throws IllegalStateException If the request is not correctly configured
- * @throws IOException Rethrows the OkHttp execute method exception
- */
- @Suppress("UNCHECKED_CAST")
- @Throws(IllegalStateException::class, IOException::class)
- fun adminSystemTasksListWithHttpInfo() : ApiResponse?> {
- val localVariableConfig = adminSystemTasksListRequestConfig()
-
- return request>(
- localVariableConfig
- )
- }
-
- /**
- * To obtain the request config of the operation adminSystemTasksList
- *
- * @return RequestConfig
- */
- fun adminSystemTasksListRequestConfig() : RequestConfig {
- val localVariableBody = null
- val localVariableQuery: MultiValueMap = mutableMapOf()
- val localVariableHeaders: MutableMap = mutableMapOf()
- localVariableHeaders["Accept"] = "application/json"
-
- return RequestConfig(
- method = RequestMethod.GET,
- path = "/admin/system_tasks/",
- query = localVariableQuery,
- headers = localVariableHeaders,
- requiresAuthentication = true,
- body = localVariableBody
- )
- }
-
- /**
- *
- * Get a single system task
- * @param id
- * @return Task
- * @throws IllegalStateException If the request is not correctly configured
- * @throws IOException Rethrows the OkHttp execute method exception
- * @throws UnsupportedOperationException If the API returns an informational or redirection response
- * @throws ClientException If the API returns a client error response
- * @throws ServerException If the API returns a server error response
- */
- @Suppress("UNCHECKED_CAST")
- @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun adminSystemTasksRetrieve(id: kotlin.String) : Task {
- val localVarResponse = adminSystemTasksRetrieveWithHttpInfo(id = id)
-
- return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as Task
- ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
- ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
- ResponseType.ClientError -> {
- val localVarError = localVarResponse as ClientError<*>
- throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
- }
- ResponseType.ServerError -> {
- val localVarError = localVarResponse as ServerError<*>
- throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
- }
- }
- }
-
- /**
- *
- * Get a single system task
- * @param id
- * @return ApiResponse
- * @throws IllegalStateException If the request is not correctly configured
- * @throws IOException Rethrows the OkHttp execute method exception
- */
- @Suppress("UNCHECKED_CAST")
- @Throws(IllegalStateException::class, IOException::class)
- fun adminSystemTasksRetrieveWithHttpInfo(id: kotlin.String) : ApiResponse {
- val localVariableConfig = adminSystemTasksRetrieveRequestConfig(id = id)
-
- return request(
- localVariableConfig
- )
- }
-
- /**
- * To obtain the request config of the operation adminSystemTasksRetrieve
- *
- * @param id
- * @return RequestConfig
- */
- fun adminSystemTasksRetrieveRequestConfig(id: kotlin.String) : RequestConfig {
- val localVariableBody = null
- val localVariableQuery: MultiValueMap = mutableMapOf()
- val localVariableHeaders: MutableMap = mutableMapOf()
- localVariableHeaders["Accept"] = "application/json"
-
- return RequestConfig(
- method = RequestMethod.GET,
- path = "/admin/system_tasks/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
- query = localVariableQuery,
- headers = localVariableHeaders,
- requiresAuthentication = true,
- body = localVariableBody
- )
- }
-
- /**
- *
- * Retry task
- * @param id
- * @return void
- * @throws IllegalStateException If the request is not correctly configured
- * @throws IOException Rethrows the OkHttp execute method exception
- * @throws UnsupportedOperationException If the API returns an informational or redirection response
- * @throws ClientException If the API returns a client error response
- * @throws ServerException If the API returns a server error response
- */
- @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun adminSystemTasksRetryCreate(id: kotlin.String) : Unit {
- val localVarResponse = adminSystemTasksRetryCreateWithHttpInfo(id = id)
-
- return when (localVarResponse.responseType) {
- ResponseType.Success -> Unit
- ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
- ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
- ResponseType.ClientError -> {
- val localVarError = localVarResponse as ClientError<*>
- throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
- }
- ResponseType.ServerError -> {
- val localVarError = localVarResponse as ServerError<*>
- throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
- }
- }
- }
-
- /**
- *
- * Retry task
- * @param id
- * @return ApiResponse
- * @throws IllegalStateException If the request is not correctly configured
- * @throws IOException Rethrows the OkHttp execute method exception
- */
- @Throws(IllegalStateException::class, IOException::class)
- fun adminSystemTasksRetryCreateWithHttpInfo(id: kotlin.String) : ApiResponse {
- val localVariableConfig = adminSystemTasksRetryCreateRequestConfig(id = id)
-
- return request(
- localVariableConfig
- )
- }
-
- /**
- * To obtain the request config of the operation adminSystemTasksRetryCreate
- *
- * @param id
- * @return RequestConfig
- */
- fun adminSystemTasksRetryCreateRequestConfig(id: kotlin.String) : RequestConfig {
- val localVariableBody = null
- val localVariableQuery: MultiValueMap = mutableMapOf()
- val localVariableHeaders: MutableMap = mutableMapOf()
- localVariableHeaders["Accept"] = "application/json"
-
- return RequestConfig(
- method = RequestMethod.POST,
- path = "/admin/system_tasks/{id}/retry/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
- query = localVariableQuery,
- headers = localVariableHeaders,
- requiresAuthentication = true,
- body = localVariableBody
- )
- }
-
/**
*
* Get running and latest version.
diff --git a/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt b/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt
index 2a5c84d..88c22da 100644
--- a/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt
+++ b/src/main/kotlin/io/goauthentik/api/apis/AuthenticatorsApi.kt
@@ -23,12 +23,21 @@ import io.goauthentik.api.models.Device
import io.goauthentik.api.models.DuoDevice
import io.goauthentik.api.models.DuoDeviceRequest
import io.goauthentik.api.models.GenericError
+import io.goauthentik.api.models.MobileDevice
+import io.goauthentik.api.models.MobileDeviceCheckInRequest
+import io.goauthentik.api.models.MobileDeviceEnrollmentCallback
+import io.goauthentik.api.models.MobileDeviceEnrollmentRequest
+import io.goauthentik.api.models.MobileDeviceEnrollmentStatus
+import io.goauthentik.api.models.MobileDeviceRequest
+import io.goauthentik.api.models.MobileDeviceResponseRequest
import io.goauthentik.api.models.PaginatedDuoDeviceList
+import io.goauthentik.api.models.PaginatedMobileDeviceList
import io.goauthentik.api.models.PaginatedSMSDeviceList
import io.goauthentik.api.models.PaginatedStaticDeviceList
import io.goauthentik.api.models.PaginatedTOTPDeviceList
import io.goauthentik.api.models.PaginatedWebAuthnDeviceList
import io.goauthentik.api.models.PatchedDuoDeviceRequest
+import io.goauthentik.api.models.PatchedMobileDeviceRequest
import io.goauthentik.api.models.PatchedSMSDeviceRequest
import io.goauthentik.api.models.PatchedStaticDeviceRequest
import io.goauthentik.api.models.PatchedTOTPDeviceRequest
@@ -608,9 +617,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param smSDeviceRequest
- * @return SMSDevice
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param mobileDeviceRequest
+ * @return MobileDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -619,11 +628,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminSmsCreate(smSDeviceRequest: SMSDeviceRequest) : SMSDevice {
- val localVarResponse = authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest = smSDeviceRequest)
+ fun authenticatorsAdminMobileCreate(mobileDeviceRequest: MobileDeviceRequest) : MobileDevice {
+ val localVarResponse = authenticatorsAdminMobileCreateWithHttpInfo(mobileDeviceRequest = mobileDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -639,30 +648,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param smSDeviceRequest
- * @return ApiResponse
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param mobileDeviceRequest
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest: SMSDeviceRequest) : ApiResponse {
- val localVariableConfig = authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest = smSDeviceRequest)
+ fun authenticatorsAdminMobileCreateWithHttpInfo(mobileDeviceRequest: MobileDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminMobileCreateRequestConfig(mobileDeviceRequest = mobileDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminSmsCreate
+ * To obtain the request config of the operation authenticatorsAdminMobileCreate
*
- * @param smSDeviceRequest
+ * @param mobileDeviceRequest
* @return RequestConfig
*/
- fun authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest: SMSDeviceRequest) : RequestConfig {
- val localVariableBody = smSDeviceRequest
+ fun authenticatorsAdminMobileCreateRequestConfig(mobileDeviceRequest: MobileDeviceRequest) : RequestConfig {
+ val localVariableBody = mobileDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -670,7 +679,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.POST,
- path = "/authenticators/admin/sms/",
+ path = "/authenticators/admin/mobile/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -680,8 +689,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
* @return void
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
@@ -690,8 +699,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @throws ServerException If the API returns a server error response
*/
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminSmsDestroy(id: kotlin.Int) : Unit {
- val localVarResponse = authenticatorsAdminSmsDestroyWithHttpInfo(id = id)
+ fun authenticatorsAdminMobileDestroy(uuid: java.util.UUID) : Unit {
+ val localVarResponse = authenticatorsAdminMobileDestroyWithHttpInfo(uuid = uuid)
return when (localVarResponse.responseType) {
ResponseType.Success -> Unit
@@ -710,15 +719,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
* @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminSmsDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
- val localVariableConfig = authenticatorsAdminSmsDestroyRequestConfig(id = id)
+ fun authenticatorsAdminMobileDestroyWithHttpInfo(uuid: java.util.UUID) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminMobileDestroyRequestConfig(uuid = uuid)
return request(
localVariableConfig
@@ -726,12 +735,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
}
/**
- * To obtain the request config of the operation authenticatorsAdminSmsDestroy
+ * To obtain the request config of the operation authenticatorsAdminMobileDestroy
*
- * @param id A unique integer value identifying this SMS Device.
+ * @param uuid A UUID string identifying this Mobile Device.
* @return RequestConfig
*/
- fun authenticatorsAdminSmsDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
+ fun authenticatorsAdminMobileDestroyRequestConfig(uuid: java.util.UUID) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
@@ -739,7 +748,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.DELETE,
- path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -749,13 +758,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
+ * Viewset for Mobile authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return PaginatedSMSDeviceList
+ * @return PaginatedMobileDeviceList
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -764,11 +773,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminSmsList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedSMSDeviceList {
- val localVarResponse = authenticatorsAdminSmsListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminMobileList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedMobileDeviceList {
+ val localVarResponse = authenticatorsAdminMobileListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedSMSDeviceList
+ ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedMobileDeviceList
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -784,28 +793,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
+ * Viewset for Mobile authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return ApiResponse
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminSmsListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
- val localVariableConfig = authenticatorsAdminSmsListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminMobileListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminMobileListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminSmsList
+ * To obtain the request config of the operation authenticatorsAdminMobileList
*
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
@@ -814,7 +823,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @param search A search term. (optional)
* @return RequestConfig
*/
- fun authenticatorsAdminSmsListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
+ fun authenticatorsAdminMobileListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf>()
.apply {
@@ -839,7 +848,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.GET,
- path = "/authenticators/admin/sms/",
+ path = "/authenticators/admin/mobile/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -849,10 +858,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
- * @param patchedSMSDeviceRequest (optional)
- * @return SMSDevice
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @param patchedMobileDeviceRequest (optional)
+ * @return MobileDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -861,11 +870,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminSmsPartialUpdate(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest? = null) : SMSDevice {
- val localVarResponse = authenticatorsAdminSmsPartialUpdateWithHttpInfo(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest)
+ fun authenticatorsAdminMobilePartialUpdate(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest? = null) : MobileDevice {
+ val localVarResponse = authenticatorsAdminMobilePartialUpdateWithHttpInfo(uuid = uuid, patchedMobileDeviceRequest = patchedMobileDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -881,32 +890,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
- * @param patchedSMSDeviceRequest (optional)
- * @return ApiResponse
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @param patchedMobileDeviceRequest (optional)
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminSmsPartialUpdateWithHttpInfo(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : ApiResponse {
- val localVariableConfig = authenticatorsAdminSmsPartialUpdateRequestConfig(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest)
+ fun authenticatorsAdminMobilePartialUpdateWithHttpInfo(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminMobilePartialUpdateRequestConfig(uuid = uuid, patchedMobileDeviceRequest = patchedMobileDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminSmsPartialUpdate
+ * To obtain the request config of the operation authenticatorsAdminMobilePartialUpdate
*
- * @param id A unique integer value identifying this SMS Device.
- * @param patchedSMSDeviceRequest (optional)
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @param patchedMobileDeviceRequest (optional)
* @return RequestConfig
*/
- fun authenticatorsAdminSmsPartialUpdateRequestConfig(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : RequestConfig {
- val localVariableBody = patchedSMSDeviceRequest
+ fun authenticatorsAdminMobilePartialUpdateRequestConfig(uuid: java.util.UUID, patchedMobileDeviceRequest: PatchedMobileDeviceRequest?) : RequestConfig {
+ val localVariableBody = patchedMobileDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -914,7 +923,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.PATCH,
- path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -924,9 +933,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
- * @return SMSDevice
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @return MobileDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -935,11 +944,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminSmsRetrieve(id: kotlin.Int) : SMSDevice {
- val localVarResponse = authenticatorsAdminSmsRetrieveWithHttpInfo(id = id)
+ fun authenticatorsAdminMobileRetrieve(uuid: java.util.UUID) : MobileDevice {
+ val localVarResponse = authenticatorsAdminMobileRetrieveWithHttpInfo(uuid = uuid)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -955,29 +964,29 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
- * @return ApiResponse
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminSmsRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse {
- val localVariableConfig = authenticatorsAdminSmsRetrieveRequestConfig(id = id)
+ fun authenticatorsAdminMobileRetrieveWithHttpInfo(uuid: java.util.UUID) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminMobileRetrieveRequestConfig(uuid = uuid)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminSmsRetrieve
+ * To obtain the request config of the operation authenticatorsAdminMobileRetrieve
*
- * @param id A unique integer value identifying this SMS Device.
+ * @param uuid A UUID string identifying this Mobile Device.
* @return RequestConfig
*/
- fun authenticatorsAdminSmsRetrieveRequestConfig(id: kotlin.Int) : RequestConfig {
+ fun authenticatorsAdminMobileRetrieveRequestConfig(uuid: java.util.UUID) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
@@ -985,7 +994,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.GET,
- path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -995,10 +1004,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
- * @param smSDeviceRequest
- * @return SMSDevice
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @param mobileDeviceRequest
+ * @return MobileDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1007,11 +1016,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminSmsUpdate(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : SMSDevice {
- val localVarResponse = authenticatorsAdminSmsUpdateWithHttpInfo(id = id, smSDeviceRequest = smSDeviceRequest)
+ fun authenticatorsAdminMobileUpdate(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : MobileDevice {
+ val localVarResponse = authenticatorsAdminMobileUpdateWithHttpInfo(uuid = uuid, mobileDeviceRequest = mobileDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as MobileDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1027,32 +1036,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for sms authenticator devices (for admins)
- * @param id A unique integer value identifying this SMS Device.
- * @param smSDeviceRequest
- * @return ApiResponse
+ * Viewset for Mobile authenticator devices (for admins)
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @param mobileDeviceRequest
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminSmsUpdateWithHttpInfo(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : ApiResponse {
- val localVariableConfig = authenticatorsAdminSmsUpdateRequestConfig(id = id, smSDeviceRequest = smSDeviceRequest)
+ fun authenticatorsAdminMobileUpdateWithHttpInfo(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminMobileUpdateRequestConfig(uuid = uuid, mobileDeviceRequest = mobileDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminSmsUpdate
+ * To obtain the request config of the operation authenticatorsAdminMobileUpdate
*
- * @param id A unique integer value identifying this SMS Device.
- * @param smSDeviceRequest
+ * @param uuid A UUID string identifying this Mobile Device.
+ * @param mobileDeviceRequest
* @return RequestConfig
*/
- fun authenticatorsAdminSmsUpdateRequestConfig(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : RequestConfig {
- val localVariableBody = smSDeviceRequest
+ fun authenticatorsAdminMobileUpdateRequestConfig(uuid: java.util.UUID, mobileDeviceRequest: MobileDeviceRequest) : RequestConfig {
+ val localVariableBody = mobileDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -1060,7 +1069,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.PUT,
- path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/mobile/{uuid}/".replace("{"+"uuid"+"}", encodeURIComponent(uuid.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1070,9 +1079,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param staticDeviceRequest
- * @return StaticDevice
+ * Viewset for sms authenticator devices (for admins)
+ * @param smSDeviceRequest
+ * @return SMSDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1081,11 +1090,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminStaticCreate(staticDeviceRequest: StaticDeviceRequest) : StaticDevice {
- val localVarResponse = authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest = staticDeviceRequest)
+ fun authenticatorsAdminSmsCreate(smSDeviceRequest: SMSDeviceRequest) : SMSDevice {
+ val localVarResponse = authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest = smSDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1101,30 +1110,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param staticDeviceRequest
- * @return ApiResponse
+ * Viewset for sms authenticator devices (for admins)
+ * @param smSDeviceRequest
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest: StaticDeviceRequest) : ApiResponse {
- val localVariableConfig = authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest = staticDeviceRequest)
+ fun authenticatorsAdminSmsCreateWithHttpInfo(smSDeviceRequest: SMSDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest = smSDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminStaticCreate
+ * To obtain the request config of the operation authenticatorsAdminSmsCreate
*
- * @param staticDeviceRequest
+ * @param smSDeviceRequest
* @return RequestConfig
*/
- fun authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest: StaticDeviceRequest) : RequestConfig {
- val localVariableBody = staticDeviceRequest
+ fun authenticatorsAdminSmsCreateRequestConfig(smSDeviceRequest: SMSDeviceRequest) : RequestConfig {
+ val localVariableBody = smSDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -1132,7 +1141,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.POST,
- path = "/authenticators/admin/static/",
+ path = "/authenticators/admin/sms/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1142,8 +1151,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
* @return void
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
@@ -1152,8 +1161,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @throws ServerException If the API returns a server error response
*/
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminStaticDestroy(id: kotlin.Int) : Unit {
- val localVarResponse = authenticatorsAdminStaticDestroyWithHttpInfo(id = id)
+ fun authenticatorsAdminSmsDestroy(id: kotlin.Int) : Unit {
+ val localVarResponse = authenticatorsAdminSmsDestroyWithHttpInfo(id = id)
return when (localVarResponse.responseType) {
ResponseType.Success -> Unit
@@ -1172,15 +1181,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
* @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminStaticDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
- val localVariableConfig = authenticatorsAdminStaticDestroyRequestConfig(id = id)
+ fun authenticatorsAdminSmsDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminSmsDestroyRequestConfig(id = id)
return request(
localVariableConfig
@@ -1188,12 +1197,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
}
/**
- * To obtain the request config of the operation authenticatorsAdminStaticDestroy
+ * To obtain the request config of the operation authenticatorsAdminSmsDestroy
*
- * @param id A unique integer value identifying this Static Device.
+ * @param id A unique integer value identifying this SMS Device.
* @return RequestConfig
*/
- fun authenticatorsAdminStaticDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
+ fun authenticatorsAdminSmsDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
@@ -1201,7 +1210,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.DELETE,
- path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1211,13 +1220,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
+ * Viewset for sms authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return PaginatedStaticDeviceList
+ * @return PaginatedSMSDeviceList
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1226,11 +1235,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminStaticList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedStaticDeviceList {
- val localVarResponse = authenticatorsAdminStaticListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminSmsList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedSMSDeviceList {
+ val localVarResponse = authenticatorsAdminSmsListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedStaticDeviceList
+ ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedSMSDeviceList
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1246,28 +1255,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
+ * Viewset for sms authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return ApiResponse
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminStaticListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
- val localVariableConfig = authenticatorsAdminStaticListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminSmsListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminSmsListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminStaticList
+ * To obtain the request config of the operation authenticatorsAdminSmsList
*
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
@@ -1276,7 +1285,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @param search A search term. (optional)
* @return RequestConfig
*/
- fun authenticatorsAdminStaticListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
+ fun authenticatorsAdminSmsListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf>()
.apply {
@@ -1301,7 +1310,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.GET,
- path = "/authenticators/admin/static/",
+ path = "/authenticators/admin/sms/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1311,10 +1320,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
- * @param patchedStaticDeviceRequest (optional)
- * @return StaticDevice
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
+ * @param patchedSMSDeviceRequest (optional)
+ * @return SMSDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1323,11 +1332,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminStaticPartialUpdate(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest? = null) : StaticDevice {
- val localVarResponse = authenticatorsAdminStaticPartialUpdateWithHttpInfo(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest)
+ fun authenticatorsAdminSmsPartialUpdate(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest? = null) : SMSDevice {
+ val localVarResponse = authenticatorsAdminSmsPartialUpdateWithHttpInfo(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1343,32 +1352,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
- * @param patchedStaticDeviceRequest (optional)
- * @return ApiResponse
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
+ * @param patchedSMSDeviceRequest (optional)
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminStaticPartialUpdateWithHttpInfo(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : ApiResponse {
- val localVariableConfig = authenticatorsAdminStaticPartialUpdateRequestConfig(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest)
+ fun authenticatorsAdminSmsPartialUpdateWithHttpInfo(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminSmsPartialUpdateRequestConfig(id = id, patchedSMSDeviceRequest = patchedSMSDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminStaticPartialUpdate
+ * To obtain the request config of the operation authenticatorsAdminSmsPartialUpdate
*
- * @param id A unique integer value identifying this Static Device.
- * @param patchedStaticDeviceRequest (optional)
+ * @param id A unique integer value identifying this SMS Device.
+ * @param patchedSMSDeviceRequest (optional)
* @return RequestConfig
*/
- fun authenticatorsAdminStaticPartialUpdateRequestConfig(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : RequestConfig {
- val localVariableBody = patchedStaticDeviceRequest
+ fun authenticatorsAdminSmsPartialUpdateRequestConfig(id: kotlin.Int, patchedSMSDeviceRequest: PatchedSMSDeviceRequest?) : RequestConfig {
+ val localVariableBody = patchedSMSDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -1376,7 +1385,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.PATCH,
- path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1386,9 +1395,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
- * @return StaticDevice
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
+ * @return SMSDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1397,11 +1406,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminStaticRetrieve(id: kotlin.Int) : StaticDevice {
- val localVarResponse = authenticatorsAdminStaticRetrieveWithHttpInfo(id = id)
+ fun authenticatorsAdminSmsRetrieve(id: kotlin.Int) : SMSDevice {
+ val localVarResponse = authenticatorsAdminSmsRetrieveWithHttpInfo(id = id)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1417,29 +1426,29 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
- * @return ApiResponse
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminStaticRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse {
- val localVariableConfig = authenticatorsAdminStaticRetrieveRequestConfig(id = id)
+ fun authenticatorsAdminSmsRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminSmsRetrieveRequestConfig(id = id)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminStaticRetrieve
+ * To obtain the request config of the operation authenticatorsAdminSmsRetrieve
*
- * @param id A unique integer value identifying this Static Device.
+ * @param id A unique integer value identifying this SMS Device.
* @return RequestConfig
*/
- fun authenticatorsAdminStaticRetrieveRequestConfig(id: kotlin.Int) : RequestConfig {
+ fun authenticatorsAdminSmsRetrieveRequestConfig(id: kotlin.Int) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
@@ -1447,7 +1456,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.GET,
- path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1457,10 +1466,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
- * @param staticDeviceRequest
- * @return StaticDevice
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
+ * @param smSDeviceRequest
+ * @return SMSDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1469,11 +1478,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminStaticUpdate(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : StaticDevice {
- val localVarResponse = authenticatorsAdminStaticUpdateWithHttpInfo(id = id, staticDeviceRequest = staticDeviceRequest)
+ fun authenticatorsAdminSmsUpdate(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : SMSDevice {
+ val localVarResponse = authenticatorsAdminSmsUpdateWithHttpInfo(id = id, smSDeviceRequest = smSDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as SMSDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1489,32 +1498,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for static authenticator devices (for admins)
- * @param id A unique integer value identifying this Static Device.
- * @param staticDeviceRequest
- * @return ApiResponse
+ * Viewset for sms authenticator devices (for admins)
+ * @param id A unique integer value identifying this SMS Device.
+ * @param smSDeviceRequest
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminStaticUpdateWithHttpInfo(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : ApiResponse {
- val localVariableConfig = authenticatorsAdminStaticUpdateRequestConfig(id = id, staticDeviceRequest = staticDeviceRequest)
+ fun authenticatorsAdminSmsUpdateWithHttpInfo(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminSmsUpdateRequestConfig(id = id, smSDeviceRequest = smSDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminStaticUpdate
+ * To obtain the request config of the operation authenticatorsAdminSmsUpdate
*
- * @param id A unique integer value identifying this Static Device.
- * @param staticDeviceRequest
+ * @param id A unique integer value identifying this SMS Device.
+ * @param smSDeviceRequest
* @return RequestConfig
*/
- fun authenticatorsAdminStaticUpdateRequestConfig(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : RequestConfig {
- val localVariableBody = staticDeviceRequest
+ fun authenticatorsAdminSmsUpdateRequestConfig(id: kotlin.Int, smSDeviceRequest: SMSDeviceRequest) : RequestConfig {
+ val localVariableBody = smSDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -1522,7 +1531,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.PUT,
- path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/sms/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1532,9 +1541,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param toTPDeviceRequest
- * @return TOTPDevice
+ * Viewset for static authenticator devices (for admins)
+ * @param staticDeviceRequest
+ * @return StaticDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1543,11 +1552,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminTotpCreate(toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice {
- val localVarResponse = authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest = toTPDeviceRequest)
+ fun authenticatorsAdminStaticCreate(staticDeviceRequest: StaticDeviceRequest) : StaticDevice {
+ val localVarResponse = authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest = staticDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1563,30 +1572,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param toTPDeviceRequest
- * @return ApiResponse
+ * Viewset for static authenticator devices (for admins)
+ * @param staticDeviceRequest
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse {
- val localVariableConfig = authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest = toTPDeviceRequest)
+ fun authenticatorsAdminStaticCreateWithHttpInfo(staticDeviceRequest: StaticDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest = staticDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminTotpCreate
+ * To obtain the request config of the operation authenticatorsAdminStaticCreate
*
- * @param toTPDeviceRequest
+ * @param staticDeviceRequest
* @return RequestConfig
*/
- fun authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig {
- val localVariableBody = toTPDeviceRequest
+ fun authenticatorsAdminStaticCreateRequestConfig(staticDeviceRequest: StaticDeviceRequest) : RequestConfig {
+ val localVariableBody = staticDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -1594,7 +1603,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.POST,
- path = "/authenticators/admin/totp/",
+ path = "/authenticators/admin/static/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1604,8 +1613,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
* @return void
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
@@ -1614,8 +1623,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @throws ServerException If the API returns a server error response
*/
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminTotpDestroy(id: kotlin.Int) : Unit {
- val localVarResponse = authenticatorsAdminTotpDestroyWithHttpInfo(id = id)
+ fun authenticatorsAdminStaticDestroy(id: kotlin.Int) : Unit {
+ val localVarResponse = authenticatorsAdminStaticDestroyWithHttpInfo(id = id)
return when (localVarResponse.responseType) {
ResponseType.Success -> Unit
@@ -1634,15 +1643,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
* @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminTotpDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
- val localVariableConfig = authenticatorsAdminTotpDestroyRequestConfig(id = id)
+ fun authenticatorsAdminStaticDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminStaticDestroyRequestConfig(id = id)
return request(
localVariableConfig
@@ -1650,12 +1659,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
}
/**
- * To obtain the request config of the operation authenticatorsAdminTotpDestroy
+ * To obtain the request config of the operation authenticatorsAdminStaticDestroy
*
- * @param id A unique integer value identifying this TOTP Device.
+ * @param id A unique integer value identifying this Static Device.
* @return RequestConfig
*/
- fun authenticatorsAdminTotpDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
+ fun authenticatorsAdminStaticDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
@@ -1663,7 +1672,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.DELETE,
- path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1673,13 +1682,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
+ * Viewset for static authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return PaginatedTOTPDeviceList
+ * @return PaginatedStaticDeviceList
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1688,11 +1697,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminTotpList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedTOTPDeviceList {
- val localVarResponse = authenticatorsAdminTotpListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminStaticList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedStaticDeviceList {
+ val localVarResponse = authenticatorsAdminStaticListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedTOTPDeviceList
+ ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedStaticDeviceList
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1708,28 +1717,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
+ * Viewset for static authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return ApiResponse
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminTotpListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
- val localVariableConfig = authenticatorsAdminTotpListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminStaticListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminStaticListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminTotpList
+ * To obtain the request config of the operation authenticatorsAdminStaticList
*
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
@@ -1738,7 +1747,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @param search A search term. (optional)
* @return RequestConfig
*/
- fun authenticatorsAdminTotpListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
+ fun authenticatorsAdminStaticListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf>()
.apply {
@@ -1763,7 +1772,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.GET,
- path = "/authenticators/admin/totp/",
+ path = "/authenticators/admin/static/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1773,10 +1782,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
- * @param patchedTOTPDeviceRequest (optional)
- * @return TOTPDevice
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
+ * @param patchedStaticDeviceRequest (optional)
+ * @return StaticDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1785,11 +1794,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminTotpPartialUpdate(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest? = null) : TOTPDevice {
- val localVarResponse = authenticatorsAdminTotpPartialUpdateWithHttpInfo(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest)
+ fun authenticatorsAdminStaticPartialUpdate(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest? = null) : StaticDevice {
+ val localVarResponse = authenticatorsAdminStaticPartialUpdateWithHttpInfo(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1805,32 +1814,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
- * @param patchedTOTPDeviceRequest (optional)
- * @return ApiResponse
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
+ * @param patchedStaticDeviceRequest (optional)
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminTotpPartialUpdateWithHttpInfo(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : ApiResponse {
- val localVariableConfig = authenticatorsAdminTotpPartialUpdateRequestConfig(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest)
+ fun authenticatorsAdminStaticPartialUpdateWithHttpInfo(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminStaticPartialUpdateRequestConfig(id = id, patchedStaticDeviceRequest = patchedStaticDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminTotpPartialUpdate
+ * To obtain the request config of the operation authenticatorsAdminStaticPartialUpdate
*
- * @param id A unique integer value identifying this TOTP Device.
- * @param patchedTOTPDeviceRequest (optional)
+ * @param id A unique integer value identifying this Static Device.
+ * @param patchedStaticDeviceRequest (optional)
* @return RequestConfig
*/
- fun authenticatorsAdminTotpPartialUpdateRequestConfig(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : RequestConfig {
- val localVariableBody = patchedTOTPDeviceRequest
+ fun authenticatorsAdminStaticPartialUpdateRequestConfig(id: kotlin.Int, patchedStaticDeviceRequest: PatchedStaticDeviceRequest?) : RequestConfig {
+ val localVariableBody = patchedStaticDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -1838,7 +1847,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.PATCH,
- path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1848,9 +1857,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
- * @return TOTPDevice
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
+ * @return StaticDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1859,11 +1868,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminTotpRetrieve(id: kotlin.Int) : TOTPDevice {
- val localVarResponse = authenticatorsAdminTotpRetrieveWithHttpInfo(id = id)
+ fun authenticatorsAdminStaticRetrieve(id: kotlin.Int) : StaticDevice {
+ val localVarResponse = authenticatorsAdminStaticRetrieveWithHttpInfo(id = id)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1879,29 +1888,29 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
- * @return ApiResponse
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminTotpRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse {
- val localVariableConfig = authenticatorsAdminTotpRetrieveRequestConfig(id = id)
+ fun authenticatorsAdminStaticRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminStaticRetrieveRequestConfig(id = id)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminTotpRetrieve
+ * To obtain the request config of the operation authenticatorsAdminStaticRetrieve
*
- * @param id A unique integer value identifying this TOTP Device.
+ * @param id A unique integer value identifying this Static Device.
* @return RequestConfig
*/
- fun authenticatorsAdminTotpRetrieveRequestConfig(id: kotlin.Int) : RequestConfig {
+ fun authenticatorsAdminStaticRetrieveRequestConfig(id: kotlin.Int) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
@@ -1909,7 +1918,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.GET,
- path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1919,10 +1928,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
- * @param toTPDeviceRequest
- * @return TOTPDevice
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
+ * @param staticDeviceRequest
+ * @return StaticDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -1931,11 +1940,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminTotpUpdate(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice {
- val localVarResponse = authenticatorsAdminTotpUpdateWithHttpInfo(id = id, toTPDeviceRequest = toTPDeviceRequest)
+ fun authenticatorsAdminStaticUpdate(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : StaticDevice {
+ val localVarResponse = authenticatorsAdminStaticUpdateWithHttpInfo(id = id, staticDeviceRequest = staticDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as StaticDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -1951,32 +1960,32 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for totp authenticator devices (for admins)
- * @param id A unique integer value identifying this TOTP Device.
- * @param toTPDeviceRequest
- * @return ApiResponse
+ * Viewset for static authenticator devices (for admins)
+ * @param id A unique integer value identifying this Static Device.
+ * @param staticDeviceRequest
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminTotpUpdateWithHttpInfo(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse {
- val localVariableConfig = authenticatorsAdminTotpUpdateRequestConfig(id = id, toTPDeviceRequest = toTPDeviceRequest)
+ fun authenticatorsAdminStaticUpdateWithHttpInfo(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminStaticUpdateRequestConfig(id = id, staticDeviceRequest = staticDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminTotpUpdate
+ * To obtain the request config of the operation authenticatorsAdminStaticUpdate
*
- * @param id A unique integer value identifying this TOTP Device.
- * @param toTPDeviceRequest
+ * @param id A unique integer value identifying this Static Device.
+ * @param staticDeviceRequest
* @return RequestConfig
*/
- fun authenticatorsAdminTotpUpdateRequestConfig(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig {
- val localVariableBody = toTPDeviceRequest
+ fun authenticatorsAdminStaticUpdateRequestConfig(id: kotlin.Int, staticDeviceRequest: StaticDeviceRequest) : RequestConfig {
+ val localVariableBody = staticDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -1984,7 +1993,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.PUT,
- path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/static/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -1994,9 +2003,9 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for WebAuthn authenticator devices (for admins)
- * @param webAuthnDeviceRequest
- * @return WebAuthnDevice
+ * Viewset for totp authenticator devices (for admins)
+ * @param toTPDeviceRequest
+ * @return TOTPDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -2005,11 +2014,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminWebauthnCreate(webAuthnDeviceRequest: WebAuthnDeviceRequest) : WebAuthnDevice {
- val localVarResponse = authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest = webAuthnDeviceRequest)
+ fun authenticatorsAdminTotpCreate(toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice {
+ val localVarResponse = authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest = toTPDeviceRequest)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice
+ ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -2025,30 +2034,30 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for WebAuthn authenticator devices (for admins)
- * @param webAuthnDeviceRequest
- * @return ApiResponse
+ * Viewset for totp authenticator devices (for admins)
+ * @param toTPDeviceRequest
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest: WebAuthnDeviceRequest) : ApiResponse {
- val localVariableConfig = authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest = webAuthnDeviceRequest)
+ fun authenticatorsAdminTotpCreateWithHttpInfo(toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest = toTPDeviceRequest)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminWebauthnCreate
+ * To obtain the request config of the operation authenticatorsAdminTotpCreate
*
- * @param webAuthnDeviceRequest
+ * @param toTPDeviceRequest
* @return RequestConfig
*/
- fun authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest: WebAuthnDeviceRequest) : RequestConfig {
- val localVariableBody = webAuthnDeviceRequest
+ fun authenticatorsAdminTotpCreateRequestConfig(toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig {
+ val localVariableBody = toTPDeviceRequest
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
localVariableHeaders["Content-Type"] = "application/json"
@@ -2056,7 +2065,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.POST,
- path = "/authenticators/admin/webauthn/",
+ path = "/authenticators/admin/totp/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -2066,8 +2075,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for WebAuthn authenticator devices (for admins)
- * @param id A unique integer value identifying this WebAuthn Device.
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
* @return void
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
@@ -2076,8 +2085,8 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @throws ServerException If the API returns a server error response
*/
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminWebauthnDestroy(id: kotlin.Int) : Unit {
- val localVarResponse = authenticatorsAdminWebauthnDestroyWithHttpInfo(id = id)
+ fun authenticatorsAdminTotpDestroy(id: kotlin.Int) : Unit {
+ val localVarResponse = authenticatorsAdminTotpDestroyWithHttpInfo(id = id)
return when (localVarResponse.responseType) {
ResponseType.Success -> Unit
@@ -2096,15 +2105,15 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for WebAuthn authenticator devices (for admins)
- * @param id A unique integer value identifying this WebAuthn Device.
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
* @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminWebauthnDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
- val localVariableConfig = authenticatorsAdminWebauthnDestroyRequestConfig(id = id)
+ fun authenticatorsAdminTotpDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminTotpDestroyRequestConfig(id = id)
return request(
localVariableConfig
@@ -2112,12 +2121,12 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
}
/**
- * To obtain the request config of the operation authenticatorsAdminWebauthnDestroy
+ * To obtain the request config of the operation authenticatorsAdminTotpDestroy
*
- * @param id A unique integer value identifying this WebAuthn Device.
+ * @param id A unique integer value identifying this TOTP Device.
* @return RequestConfig
*/
- fun authenticatorsAdminWebauthnDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
+ fun authenticatorsAdminTotpDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf()
val localVariableHeaders: MutableMap = mutableMapOf()
@@ -2125,7 +2134,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.DELETE,
- path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -2135,13 +2144,13 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for WebAuthn authenticator devices (for admins)
+ * Viewset for totp authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return PaginatedWebAuthnDeviceList
+ * @return PaginatedTOTPDeviceList
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -2150,11 +2159,11 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminWebauthnList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedWebAuthnDeviceList {
- val localVarResponse = authenticatorsAdminWebauthnListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminTotpList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedTOTPDeviceList {
+ val localVarResponse = authenticatorsAdminTotpListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
return when (localVarResponse.responseType) {
- ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedWebAuthnDeviceList
+ ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedTOTPDeviceList
ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
ResponseType.ClientError -> {
@@ -2170,28 +2179,28 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for WebAuthn authenticator devices (for admins)
+ * Viewset for totp authenticator devices (for admins)
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
* @param page A page number within the paginated result set. (optional)
* @param pageSize Number of results to return per page. (optional)
* @param search A search term. (optional)
- * @return ApiResponse
+ * @return ApiResponse
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class)
- fun authenticatorsAdminWebauthnListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
- val localVariableConfig = authenticatorsAdminWebauthnListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+ fun authenticatorsAdminTotpListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminTotpListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
- return request(
+ return request(
localVariableConfig
)
}
/**
- * To obtain the request config of the operation authenticatorsAdminWebauthnList
+ * To obtain the request config of the operation authenticatorsAdminTotpList
*
* @param name (optional)
* @param ordering Which field to use when ordering the results. (optional)
@@ -2200,7 +2209,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
* @param search A search term. (optional)
* @return RequestConfig
*/
- fun authenticatorsAdminWebauthnListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
+ fun authenticatorsAdminTotpListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
val localVariableBody = null
val localVariableQuery: MultiValueMap = mutableMapOf>()
.apply {
@@ -2225,7 +2234,7 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
return RequestConfig(
method = RequestMethod.GET,
- path = "/authenticators/admin/webauthn/",
+ path = "/authenticators/admin/totp/",
query = localVariableQuery,
headers = localVariableHeaders,
requiresAuthentication = true,
@@ -2235,10 +2244,10 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
/**
*
- * Viewset for WebAuthn authenticator devices (for admins)
- * @param id A unique integer value identifying this WebAuthn Device.
- * @param patchedWebAuthnDeviceRequest (optional)
- * @return WebAuthnDevice
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
+ * @param patchedTOTPDeviceRequest (optional)
+ * @return TOTPDevice
* @throws IllegalStateException If the request is not correctly configured
* @throws IOException Rethrows the OkHttp execute method exception
* @throws UnsupportedOperationException If the API returns an informational or redirection response
@@ -2247,11 +2256,1151 @@ class AuthenticatorsApi(basePath: kotlin.String = defaultBasePath, client: OkHtt
*/
@Suppress("UNCHECKED_CAST")
@Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
- fun authenticatorsAdminWebauthnPartialUpdate(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest? = null) : WebAuthnDevice {
- val localVarResponse = authenticatorsAdminWebauthnPartialUpdateWithHttpInfo(id = id, patchedWebAuthnDeviceRequest = patchedWebAuthnDeviceRequest)
+ fun authenticatorsAdminTotpPartialUpdate(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest? = null) : TOTPDevice {
+ val localVarResponse = authenticatorsAdminTotpPartialUpdateWithHttpInfo(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
+ * @param patchedTOTPDeviceRequest (optional)
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminTotpPartialUpdateWithHttpInfo(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminTotpPartialUpdateRequestConfig(id = id, patchedTOTPDeviceRequest = patchedTOTPDeviceRequest)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminTotpPartialUpdate
+ *
+ * @param id A unique integer value identifying this TOTP Device.
+ * @param patchedTOTPDeviceRequest (optional)
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminTotpPartialUpdateRequestConfig(id: kotlin.Int, patchedTOTPDeviceRequest: PatchedTOTPDeviceRequest?) : RequestConfig {
+ val localVariableBody = patchedTOTPDeviceRequest
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Content-Type"] = "application/json"
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.PATCH,
+ path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
+ * @return TOTPDevice
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminTotpRetrieve(id: kotlin.Int) : TOTPDevice {
+ val localVarResponse = authenticatorsAdminTotpRetrieveWithHttpInfo(id = id)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminTotpRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminTotpRetrieveRequestConfig(id = id)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminTotpRetrieve
+ *
+ * @param id A unique integer value identifying this TOTP Device.
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminTotpRetrieveRequestConfig(id: kotlin.Int) : RequestConfig {
+ val localVariableBody = null
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.GET,
+ path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
+ * @param toTPDeviceRequest
+ * @return TOTPDevice
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminTotpUpdate(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : TOTPDevice {
+ val localVarResponse = authenticatorsAdminTotpUpdateWithHttpInfo(id = id, toTPDeviceRequest = toTPDeviceRequest)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as TOTPDevice
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for totp authenticator devices (for admins)
+ * @param id A unique integer value identifying this TOTP Device.
+ * @param toTPDeviceRequest
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminTotpUpdateWithHttpInfo(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminTotpUpdateRequestConfig(id = id, toTPDeviceRequest = toTPDeviceRequest)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminTotpUpdate
+ *
+ * @param id A unique integer value identifying this TOTP Device.
+ * @param toTPDeviceRequest
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminTotpUpdateRequestConfig(id: kotlin.Int, toTPDeviceRequest: TOTPDeviceRequest) : RequestConfig {
+ val localVariableBody = toTPDeviceRequest
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Content-Type"] = "application/json"
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.PUT,
+ path = "/authenticators/admin/totp/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param webAuthnDeviceRequest
+ * @return WebAuthnDevice
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminWebauthnCreate(webAuthnDeviceRequest: WebAuthnDeviceRequest) : WebAuthnDevice {
+ val localVarResponse = authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest = webAuthnDeviceRequest)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param webAuthnDeviceRequest
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminWebauthnCreateWithHttpInfo(webAuthnDeviceRequest: WebAuthnDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest = webAuthnDeviceRequest)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminWebauthnCreate
+ *
+ * @param webAuthnDeviceRequest
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminWebauthnCreateRequestConfig(webAuthnDeviceRequest: WebAuthnDeviceRequest) : RequestConfig {
+ val localVariableBody = webAuthnDeviceRequest
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Content-Type"] = "application/json"
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.POST,
+ path = "/authenticators/admin/webauthn/",
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @return void
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminWebauthnDestroy(id: kotlin.Int) : Unit {
+ val localVarResponse = authenticatorsAdminWebauthnDestroyWithHttpInfo(id = id)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> Unit
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminWebauthnDestroyWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminWebauthnDestroyRequestConfig(id = id)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminWebauthnDestroy
+ *
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminWebauthnDestroyRequestConfig(id: kotlin.Int) : RequestConfig {
+ val localVariableBody = null
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.DELETE,
+ path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param name (optional)
+ * @param ordering Which field to use when ordering the results. (optional)
+ * @param page A page number within the paginated result set. (optional)
+ * @param pageSize Number of results to return per page. (optional)
+ * @param search A search term. (optional)
+ * @return PaginatedWebAuthnDeviceList
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminWebauthnList(name: kotlin.String? = null, ordering: kotlin.String? = null, page: kotlin.Int? = null, pageSize: kotlin.Int? = null, search: kotlin.String? = null) : PaginatedWebAuthnDeviceList {
+ val localVarResponse = authenticatorsAdminWebauthnListWithHttpInfo(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as PaginatedWebAuthnDeviceList
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param name (optional)
+ * @param ordering Which field to use when ordering the results. (optional)
+ * @param page A page number within the paginated result set. (optional)
+ * @param pageSize Number of results to return per page. (optional)
+ * @param search A search term. (optional)
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminWebauthnListWithHttpInfo(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminWebauthnListRequestConfig(name = name, ordering = ordering, page = page, pageSize = pageSize, search = search)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminWebauthnList
+ *
+ * @param name (optional)
+ * @param ordering Which field to use when ordering the results. (optional)
+ * @param page A page number within the paginated result set. (optional)
+ * @param pageSize Number of results to return per page. (optional)
+ * @param search A search term. (optional)
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminWebauthnListRequestConfig(name: kotlin.String?, ordering: kotlin.String?, page: kotlin.Int?, pageSize: kotlin.Int?, search: kotlin.String?) : RequestConfig {
+ val localVariableBody = null
+ val localVariableQuery: MultiValueMap = mutableMapOf>()
+ .apply {
+ if (name != null) {
+ put("name", listOf(name.toString()))
+ }
+ if (ordering != null) {
+ put("ordering", listOf(ordering.toString()))
+ }
+ if (page != null) {
+ put("page", listOf(page.toString()))
+ }
+ if (pageSize != null) {
+ put("page_size", listOf(pageSize.toString()))
+ }
+ if (search != null) {
+ put("search", listOf(search.toString()))
+ }
+ }
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.GET,
+ path = "/authenticators/admin/webauthn/",
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @param patchedWebAuthnDeviceRequest (optional)
+ * @return WebAuthnDevice
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminWebauthnPartialUpdate(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest? = null) : WebAuthnDevice {
+ val localVarResponse = authenticatorsAdminWebauthnPartialUpdateWithHttpInfo(id = id, patchedWebAuthnDeviceRequest = patchedWebAuthnDeviceRequest)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @param patchedWebAuthnDeviceRequest (optional)
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminWebauthnPartialUpdateWithHttpInfo(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest?) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminWebauthnPartialUpdateRequestConfig(id = id, patchedWebAuthnDeviceRequest = patchedWebAuthnDeviceRequest)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminWebauthnPartialUpdate
+ *
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @param patchedWebAuthnDeviceRequest (optional)
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminWebauthnPartialUpdateRequestConfig(id: kotlin.Int, patchedWebAuthnDeviceRequest: PatchedWebAuthnDeviceRequest?) : RequestConfig {
+ val localVariableBody = patchedWebAuthnDeviceRequest
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Content-Type"] = "application/json"
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.PATCH,
+ path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @return WebAuthnDevice
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminWebauthnRetrieve(id: kotlin.Int) : WebAuthnDevice {
+ val localVarResponse = authenticatorsAdminWebauthnRetrieveWithHttpInfo(id = id)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminWebauthnRetrieveWithHttpInfo(id: kotlin.Int) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminWebauthnRetrieveRequestConfig(id = id)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminWebauthnRetrieve
+ *
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminWebauthnRetrieveRequestConfig(id: kotlin.Int) : RequestConfig {
+ val localVariableBody = null
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.GET,
+ path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @param webAuthnDeviceRequest
+ * @return WebAuthnDevice
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAdminWebauthnUpdate(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : WebAuthnDevice {
+ val localVarResponse = authenticatorsAdminWebauthnUpdateWithHttpInfo(id = id, webAuthnDeviceRequest = webAuthnDeviceRequest)
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as WebAuthnDevice
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Viewset for WebAuthn authenticator devices (for admins)
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @param webAuthnDeviceRequest
+ * @return ApiResponse
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAdminWebauthnUpdateWithHttpInfo(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : ApiResponse {
+ val localVariableConfig = authenticatorsAdminWebauthnUpdateRequestConfig(id = id, webAuthnDeviceRequest = webAuthnDeviceRequest)
+
+ return request(
+ localVariableConfig
+ )
+ }
+
+ /**
+ * To obtain the request config of the operation authenticatorsAdminWebauthnUpdate
+ *
+ * @param id A unique integer value identifying this WebAuthn Device.
+ * @param webAuthnDeviceRequest
+ * @return RequestConfig
+ */
+ fun authenticatorsAdminWebauthnUpdateRequestConfig(id: kotlin.Int, webAuthnDeviceRequest: WebAuthnDeviceRequest) : RequestConfig {
+ val localVariableBody = webAuthnDeviceRequest
+ val localVariableQuery: MultiValueMap = mutableMapOf()
+ val localVariableHeaders: MutableMap = mutableMapOf()
+ localVariableHeaders["Content-Type"] = "application/json"
+ localVariableHeaders["Accept"] = "application/json"
+
+ return RequestConfig(
+ method = RequestMethod.PUT,
+ path = "/authenticators/admin/webauthn/{id}/".replace("{"+"id"+"}", encodeURIComponent(id.toString())),
+ query = localVariableQuery,
+ headers = localVariableHeaders,
+ requiresAuthentication = true,
+ body = localVariableBody
+ )
+ }
+
+ /**
+ *
+ * Get all devices for current user
+ * @return kotlin.collections.List
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ * @throws UnsupportedOperationException If the API returns an informational or redirection response
+ * @throws ClientException If the API returns a client error response
+ * @throws ServerException If the API returns a server error response
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class, UnsupportedOperationException::class, ClientException::class, ServerException::class)
+ fun authenticatorsAllList() : kotlin.collections.List {
+ val localVarResponse = authenticatorsAllListWithHttpInfo()
+
+ return when (localVarResponse.responseType) {
+ ResponseType.Success -> (localVarResponse as Success<*>).data as kotlin.collections.List
+ ResponseType.Informational -> throw UnsupportedOperationException("Client does not support Informational responses.")
+ ResponseType.Redirection -> throw UnsupportedOperationException("Client does not support Redirection responses.")
+ ResponseType.ClientError -> {
+ val localVarError = localVarResponse as ClientError<*>
+ throw ClientException("Client error : ${localVarError.statusCode} ${localVarError.message.orEmpty()}", localVarError.statusCode, localVarResponse)
+ }
+ ResponseType.ServerError -> {
+ val localVarError = localVarResponse as ServerError<*>
+ throw ServerException("Server error : ${localVarError.statusCode} ${localVarError.message.orEmpty()} ${localVarError.body}", localVarError.statusCode, localVarResponse)
+ }
+ }
+ }
+
+ /**
+ *
+ * Get all devices for current user
+ * @return ApiResponse?>
+ * @throws IllegalStateException If the request is not correctly configured
+ * @throws IOException Rethrows the OkHttp execute method exception
+ */
+ @Suppress("UNCHECKED_CAST")
+ @Throws(IllegalStateException::class, IOException::class)
+ fun authenticatorsAllListWithHttpInfo() : ApiResponse?> {
+ val localVariableConfig = authenticatorsAllListRequestConfig()
+
+ return request